Privilege Escalation Affecting celery package, versions [,2.2.8)[2.3.0,2.3.4)[2.4.0,2.4.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-CELERY-40086
  • published25 Feb 2016
  • disclosed5 Dec 2011
  • creditUnknown

Introduced: 5 Dec 2011

CVE-2011-4356  (opens in a new tab)
CWE-264  (opens in a new tab)

Overview

celery is a Distributed Task Queue. Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.

CVSS Scores

version 3.1