GHSA-q4xr-rc97-m4xx

Suggest an improvement
Source
https://github.com/advisories/GHSA-q4xr-rc97-m4xx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-q4xr-rc97-m4xx/GHSA-q4xr-rc97-m4xx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q4xr-rc97-m4xx
Aliases
Published
2022-01-06T22:22:02Z
Modified
2024-09-06T16:46:57.644996Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
OS Command Injection in celery
Details

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

References

Affected packages

PyPI / celery

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.2.2

Affected versions

0.*

0.1.2
0.1.4
0.1.6
0.1.7
0.1.8
0.1.10
0.1.11
0.1.12
0.1.13
0.1.14
0.1.15
0.2.0
0.3.0
0.3.7
0.3.20
0.4.0
0.4.1
0.6.0
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.2.0
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.2.8
2.2.9
2.2.10
2.3.0
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.4.0
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.4.6
2.4.7
2.5.0
2.5.1
2.5.2
2.5.3
2.5.5

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8
3.0.9
3.0.10
3.0.11
3.0.12
3.0.13
3.0.14
3.0.15
3.0.16
3.0.17
3.0.18
3.0.19
3.0.20
3.0.21
3.0.22
3.0.23
3.0.24
3.0.25
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.1.10
3.1.11
3.1.12
3.1.13
3.1.14
3.1.15
3.1.16
3.1.17
3.1.18
3.1.19
3.1.20
3.1.21
3.1.22
3.1.23
3.1.24
3.1.25
3.1.26-1
3.1.26.post2

4.*

4.0.0rc3
4.0.0rc4
4.0.0rc5
4.0.0rc6
4.0.0rc7
4.0.0
4.0.1
4.0.2
4.1.0
4.1.1
4.2.0rc1
4.2.0rc2
4.2.0rc3
4.2.0rc4
4.2.0
4.2.1
4.2.2
4.3.0rc1
4.3.0rc2
4.3.0rc3
4.3.0
4.3.1
4.4.0rc1
4.4.0rc2
4.4.0rc3
4.4.0rc4
4.4.0rc5
4.4.0
4.4.1
4.4.2
4.4.3
4.4.4
4.4.5
4.4.6
4.4.7

5.*

5.0.0a1
5.0.0a2
5.0.0b1
5.0.0rc1
5.0.0rc2
5.0.0rc3
5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.0.5
5.0.6
5.1.0b1
5.1.0b2
5.1.0rc1
5.1.0
5.1.1
5.1.2
5.2.0b1
5.2.0b2
5.2.0b3
5.2.0rc1
5.2.0rc2
5.2.0
5.2.1