CVE-2021-23727
Stored Command Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
Esto afecta al paquete celery versiones anteriores a 5.2.2. Por defecto confía en los mensajes y metadatos almacenados en los backends (almacenes de resultados). Cuando son leídos los metadatos de la tarea desde el backend, los datos son deserializados. Dado que un atacante puede conseguir acceso a, o de alguna manera manipular los metadatos dentro de un backend de celery, podría desencadenar una vulnerabilidad de inyección de comandos almacenados y potencialmente conseguir acceso al sistema
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-08 CVE Reserved
- 2021-12-29 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2024-10-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/celery/celery/blob/master/Changelog.rst%23522 | Broken Link |
URL | Date | SRC |
---|---|---|
https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 | 2024-09-16 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Celeryproject Search vendor "Celeryproject" | Celery Search vendor "Celeryproject" for product "Celery" | < 5.2.2 Search vendor "Celeryproject" for product "Celery" and version " < 5.2.2" | python |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Extra Packages For Enterprise Linux Search vendor "Fedoraproject" for product "Extra Packages For Enterprise Linux" | 7.0 Search vendor "Fedoraproject" for product "Extra Packages For Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
|