CVE-2021-23727

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23727
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23727.json
Aliases
Published
2021-12-29T17:15:07Z
Modified
2023-11-08T04:05:12.931743Z
Details

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

References

Affected packages

Git / github.com/celery/celery

Affected ranges

Type
GIT
Repo
https://github.com/celery/celery
Events
Introduced
0The exact introduced commit is unknown
Fixed