Lucene search

K
cve[email protected]CVE-2011-4356
HistoryDec 05, 2011 - 11:55 a.m.

CVE-2011-4356

2011-12-0511:55:07
CWE-264
web.nvd.nist.gov
21
cve-2011-4356
celery
privilege escalation
security vulnerability
nvd

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.

Affected configurations

NVD
Node
celeryprojectceleryMatch2.1.0
OR
celeryprojectceleryMatch2.2.0
OR
celeryprojectceleryMatch2.2.1
OR
celeryprojectceleryMatch2.2.2
OR
celeryprojectceleryMatch2.2.3
OR
celeryprojectceleryMatch2.2.4
OR
celeryprojectceleryMatch2.2.5
OR
celeryprojectceleryMatch2.2.6
OR
celeryprojectceleryMatch2.2.7
OR
celeryprojectceleryMatch2.3.0
OR
celeryprojectceleryMatch2.3.1
OR
celeryprojectceleryMatch2.3.2
OR
celeryprojectceleryMatch2.3.3
OR
celeryprojectceleryMatch2.4.0
OR
celeryprojectceleryMatch2.4.1
OR
celeryprojectceleryMatch2.4.2
OR
celeryprojectceleryMatch2.4.3

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%