File: CELERYSA-0003.txt

package info (click to toggle)
celery 5.0.0-3
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 6,340 kB
  • sloc: python: 49,817; sh: 666; makefile: 212
file content (59 lines) | stat: -rw-r--r-- 1,551 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
=========================================
 CELERYSA-0003: Celery Security Advisory
=========================================
:contact: security@celeryproject.org
:CVE id: TBA
:date: 2016-12-08 05:00:00 p.m. PST

Details
=======

:package: celery
:vulnerability: Configuration Error
:problem type: remote
:risk: low
:versions-affected: 4.0.0

Description
===========

The default configuration in Celery 4.0.0 allowed for deserialization
of pickled messages, even if the software is configured to send
messages in the JSON format.

The particular configuration in question is the `accept_content` setting,
which by default was set to:

    app.conf.accept_content = ['json', 'pickle', 'msgpack', 'yaml']

The risk is still set to low considering that an attacker would require access
to the message broker used to send messages to Celery workers.

Systems affected
================

Users of Celery version 4.0.0 with no explicit accept_content setting set.

Solution
========

To work around the issue you can explicitly configure the accept_content
setting:

    app.conf.accept_content = ['json']

Or you can upgrade to the Celery 4.0.1 version:

    $ pip install -U celery

Distribution package maintainers are urged to provide their users
with updated packages.

Please direct questions to the celery-users mailing-list:
https://groups.google.com/group/celery-users/,

or if you're planning to report a new security related issue we request that
you keep the information confidential by contacting
security@celeryproject.org instead.

Thank you!