flower@0.7.3 vulnerabilities

Celery Flower

Direct Vulnerabilities

Known vulnerabilities in the flower package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Timing Attack

Affected versions of this package are vulnerable to Timing Attack via the get_current_user() functionality, due to the usage of non-constant time string comparison to validate HTTP basic authentication credentials.

How to fix Timing Attack?

Upgrade flower to version 2.0.0 or higher.

[,2.0.0)
  • C
Access Restriction Bypass

Affected versions of this package are vulnerable to Access Restriction Bypass due to an OAuth authentication bypass. An attacker could access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.

How to fix Access Restriction Bypass?

Upgrade flower to version 1.2.0 or higher.

[,1.2.0)
  • M
Cross-site Scripting (XSS)

flower is a Celery Flower.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks. User input was not escaped in the tasks page, allowing remote attackers to inject arbitrary web script or HTML.

How to fix Cross-site Scripting (XSS)?

Upgrade flower to version 0.9.2 or higher.

[,0.9.2)