Vulnerability Description
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Celeryproject | Celery | 2.1.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/46973
- http://www.securityfocus.com/bid/50825
- https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txtPatch
- https://github.com/ask/celery/pull/544
- http://secunia.com/advisories/46973
- http://www.securityfocus.com/bid/50825
- https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txtPatch
- https://github.com/ask/celery/pull/544
FAQ
What is CVE-2011-4356?
CVE-2011-4356 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, c...
How severe is CVE-2011-4356?
CVE-2011-4356 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4356?
Check the references section above for vendor advisories and patch information. Affected products include: Celeryproject Celery.