flower@1.1.0 vulnerabilities

Celery Flower

Direct Vulnerabilities

Known vulnerabilities in the flower package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Timing Attack

Affected versions of this package are vulnerable to Timing Attack via the get_current_user() functionality, due to the usage of non-constant time string comparison to validate HTTP basic authentication credentials.

How to fix Timing Attack?

Upgrade flower to version 2.0.0 or higher.

[,2.0.0)
  • C
Access Restriction Bypass

Affected versions of this package are vulnerable to Access Restriction Bypass due to an OAuth authentication bypass. An attacker could access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.

How to fix Access Restriction Bypass?

Upgrade flower to version 1.2.0 or higher.

[,1.2.0)