logo

CVE-2011-4356 celery

Package

Manager: pip
Name: celery
Vulnerable Version: >=2.1.0 <2.2.8 || >=2.3.0 <2.3.4 || >=2.4.0 <2.4.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L

EPSS: 0.00047 pctl0.13946

Details

Celery local privilege escalation vulnerability Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.

Metadata

Created: 2022-05-17T05:36:00Z
Modified: 2024-09-06T16:36:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rpc6-h455-3rx5/GHSA-rpc6-h455-3rx5.json
CWE IDs: ["CWE-269"]
Alternative ID: GHSA-rpc6-h455-3rx5
Finding: F159
Auto approve: 1