7.5
CVSSv3

CVE-2021-23727

Published: 29/12/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

This affects the package celery prior to 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

celeryproject celery

fedoraproject fedora 35

fedoraproject extra packages for enterprise linux 7.0

Vendor Advisories

This affects the package celery before 522 It by default trusts the messages and metadata stored in backends (result stores) When reading task metadata from the backend, the data is deserialized Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection v ...