|
Message-ID: <4ED34FAD.4040501@redhat.com> Date: Mon, 28 Nov 2011 10:09:01 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security@...ts.openwall.com Subject: CVE Request -- python-celery / Celery v2.4 -- Privilege escalation due improper sanitization of --uid and --gid arguments in certain tools (CELERYSA-0001 Hello Kurt, Steve, vendors, a privilege escalation flaw was found in the way 'celeryd-multi', 'celeryd_detach', 'celerybeat' and 'celeryev' tools of the Celery, an asynchronous task queue based on distributed message passing, performed sanitization of --uid and --gid arguments, provided to the tools on the command line (only effective user id was changed, with the real one remaining unchanged). A local attacker could use this flaw to send messages via the message broker or use the Pickle serializer to load and execute arbitrary code with elevated privileges. References: [1] http://www.celeryproject.org/news/celery-24-released/ [2] http://docs.celeryproject.org/en/latest/changelog.html#version-2-4-4 [3] https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txt [4] https://github.com/ask/celery/pull/544 Relevant upstream patch: [5] https://github.com/gadomski/celery/commit/2afc0ea2ea22bce25013c9867f89e41a48b9251b Could you allocate a CVE id for this issue? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.