Access Restriction Bypass Affecting flower package, versions [,1.2.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.14% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-FLOWER-2858331
  • published 3 Jun 2022
  • disclosed 3 Jun 2022
  • credit Tanner Prynn (@tprynn)

How to fix?

Upgrade flower to version 1.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass due to an OAuth authentication bypass. An attacker could access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.

CVSS Scores

version 3.1
Expand this section

Snyk

9.3 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    High
Expand this section

NVD

8.6 high