Date: Mon, 28 Nov 2011 08:18:41 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- python-celery / Celery v2.4 -- Privilege escalation due improper sanitization of --uid and --gid arguments in certain tools (CELERYSA-0001 On 11/28/2011 02:09 AM, Jan Lieskovsky wrote: > Hello Kurt, Steve, vendors, > > a privilege escalation flaw was found in the way 'celeryd-multi', > 'celeryd_detach', 'celerybeat' and 'celeryev' tools of the Celery, > an asynchronous task queue based on distributed message passing, > performed sanitization of --uid and --gid arguments, provided to > the tools on the command line (only effective user id was changed, > with the real one remaining unchanged). A local attacker could use > this flaw to send messages via the message broker or use the Pickle > serializer to load and execute arbitrary code with elevated privileges. > > References: >  http://www.celeryproject.org/news/celery-24-released/ >  http://docs.celeryproject.org/en/latest/changelog.html#version-2-4-4 >  https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txt >  https://github.com/ask/celery/pull/544 > > Relevant upstream patch: >  > https://github.com/gadomski/celery/commit/2afc0ea2ea22bce25013c9867f89e41a48b9251b > > Could you allocate a CVE id for this issue? > > Thank you && Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team Please use CVE-2011-4356 for this issue. -- -Kurt Seifried / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.