Lucene search

K
githubGitHub Advisory DatabaseGHSA-RPC6-H455-3RX5
HistoryMay 17, 2022 - 5:36 a.m.

Celery local privilege escalation vulnerability

2022-05-1705:36:00
CWE-269
GitHub Advisory Database
github.com
8
celery
local privilege escalation
vulnerability
version 2.1-2.4
worker process
crafted code
privileges

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

5.1%

Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.

Affected configurations

Vulners
Node
celeryprojectceleryRange2.4.02.4.4
OR
celeryprojectceleryRange2.3.02.3.4
OR
celeryprojectceleryRange2.1.02.2.8
VendorProductVersionCPE
celeryprojectcelery*cpe:2.3:a:celeryproject:celery:*:*:*:*:*:*:*:*

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

5.1%