Permissions, Privileges, and Access Controls in celery - CVE-2011-4356
Published: December 5, 2011 / Updated: August 11, 2020
celery
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.