logo

CVE-2021-23727 celery

Package

Manager: pip
Name: celery
Vulnerable Version: >=0 <5.2.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02018 pctl0.8304

Details

OS Command Injection in celery This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

Metadata

Created: 2022-01-06T22:22:02Z
Modified: 2024-09-06T16:27:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-q4xr-rc97-m4xx/GHSA-q4xr-rc97-m4xx.json
CWE IDs: ["CWE-77", "CWE-78"]
Alternative ID: GHSA-q4xr-rc97-m4xx
Finding: F404
Auto approve: 1