CVE-2021-23727

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:celeryproject:celery:*:*:*:*:*:python:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
References () https://github.com/celery/celery/blob/master/Changelog.rst%23522 - Broken Link, Release Notes, Third Party Advisory () https://github.com/celery/celery/blob/master/Changelog.rst%23522 - Broken Link, Release Notes, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/ -
References () https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 - Exploit, Third Party Advisory

14 Jun 2022, 14:38

Type Values Removed Values Added
CPE cpe:2.3:a:fedoraproject:fedora_extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*

01 Apr 2022, 15:29

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/ - Mailing List, Third Party Advisory

16 Jan 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYXRGHWHD2WWMHBWCVD5ULVINPKNY3P5/ -

10 Jan 2022, 17:00

Type Values Removed Values Added
CWE CWE-77
CPE cpe:2.3:a:fedoraproject:fedora_extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:celeryproject:celery:*:*:*:*:*:python:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.0
v3 : 7.5
References (MISC) https://github.com/celery/celery/blob/master/Changelog.rst%23522 - (MISC) https://github.com/celery/celery/blob/master/Changelog.rst%23522 - Broken Link, Release Notes, Third Party Advisory
References (MISC) https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 - (MISC) https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 - Exploit, Third Party Advisory

29 Dec 2021, 17:29

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-29 17:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23727

Mitre link : CVE-2021-23727

CVE.ORG link : CVE-2021-23727


JSON object : View

Products Affected

celeryproject

  • celery

fedoraproject

  • fedora
  • extra_packages_for_enterprise_linux
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')