Access Restriction Bypass Affecting flower package, versions [,1.2.0)



    Attack Complexity Low
    Scope Changed
    Availability High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.14% (49th percentile)
Expand this section
8.6 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-FLOWER-2858331
  • published 3 Jun 2022
  • disclosed 3 Jun 2022
  • credit Tanner Prynn (@tprynn)

How to fix?

Upgrade flower to version 1.2.0 or higher.


Affected versions of this package are vulnerable to Access Restriction Bypass due to an OAuth authentication bypass. An attacker could access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.