Vulnerability Details CVE-2011-4356
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.4%
CVSS Severity
CVSS v2 Score 6.9
Products affected by CVE-2011-4356
-
cpe:2.3:a:celeryproject:celery:2.1.0
-
cpe:2.3:a:celeryproject:celery:2.2.0
-
cpe:2.3:a:celeryproject:celery:2.2.1
-
cpe:2.3:a:celeryproject:celery:2.2.2
-
cpe:2.3:a:celeryproject:celery:2.2.3
-
cpe:2.3:a:celeryproject:celery:2.2.4
-
cpe:2.3:a:celeryproject:celery:2.2.5
-
cpe:2.3:a:celeryproject:celery:2.2.6
-
cpe:2.3:a:celeryproject:celery:2.2.7
-
cpe:2.3:a:celeryproject:celery:2.3.0
-
cpe:2.3:a:celeryproject:celery:2.3.1
-
cpe:2.3:a:celeryproject:celery:2.3.2
-
cpe:2.3:a:celeryproject:celery:2.3.3
-
cpe:2.3:a:celeryproject:celery:2.4.0
-
cpe:2.3:a:celeryproject:celery:2.4.1
-
cpe:2.3:a:celeryproject:celery:2.4.2
-
cpe:2.3:a:celeryproject:celery:2.4.3