CVE-2021-23727Command Injection in Celery

Severity
7.5HIGHNVD
EPSS
1.4%
top 19.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 29
Latest updateJan 6

Description

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages6 packages

debiandebian/celery< celery 5.2.3-1 (bookworm)
CVEListV5celeryproject/celeryunspecified5.2.2
PyPIceleryproject/celery< 5.2.2
Debianceleryproject/celery< 5.2.3-1+2

Also affects: Fedora 35

🔴Vulnerability Details

3
GHSA
OS Command Injection in celery2022-01-06
OSV
OS Command Injection in celery2022-01-06
OSV
CVE-2021-23727: This affects the package celery before 52021-12-29

📋Vendor Advisories

2
Red Hat
celery: stored command injection vulnerability may allow privileges escalation2021-12-29
Debian
CVE-2021-23727: celery - This affects the package celery before 5.2.2. It by default trusts the messages ...2021
CVE-2021-23727 — Command Injection in Celery | cvebase