Skip to content

Celery local privilege escalation vulnerability

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Sep 6, 2024

Package

pip celery (pip)

Affected versions

>= 2.1.0, < 2.2.8
>= 2.3.0, < 2.3.4
>= 2.4.0, < 2.4.4

Patched versions

2.2.8
2.3.4
2.4.4

Description

Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.

References

Published by the National Vulnerability Database Dec 5, 2011
Published to the GitHub Advisory Database May 17, 2022
Reviewed May 1, 2024
Last updated Sep 6, 2024

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(14th percentile)

Weaknesses

Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Learn more on MITRE.

CVE ID

CVE-2011-4356

GHSA ID

GHSA-rpc6-h455-3rx5

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.