Cleartext Storage of Sensitive Information Affecting django-celery-results package, versions [,2.0.0)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cleartext Storage of Sensitive Information vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-DJANGOCELERYRESULTS-598234
  • published12 Aug 2020
  • disclosed12 Aug 2020
  • creditUnknown

Introduced: 12 Aug 2020

CVE-2020-17495  (opens in a new tab)
CWE-312  (opens in a new tab)

How to fix?

Upgrade django-celery-results to version 2.0.0 or higher.

Overview

django-celery-results is a Celery result backends for Django.

Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information. It stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.

CVSS Base Scores

version 3.1