{ "id": "CVE-2011-4356", "sourceIdentifier": "secalert@redhat.com", "published": "2011-12-05T11:55:07.380", "lastModified": "2012-01-03T16:38:45.003", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process." }, { "lang": "es", "value": "Celery v2.1 y v2.2 antes de v2.2.8, v2.3 antes de v2.3.4 y v2.4 antes de v2.4.4 cambia el id efectivo pero no el id real durante el procesamiento de los argumentos --uid y --gid a celerybeat, celeryd_detach, celeryd multi y celeryev, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de vectores que implican c\u00f3digo dise\u00f1ado especificamente para este fin que es ejecutado por el proceso de trabajo." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 6.9 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "555E6457-BA01-495D-9C74-DAC8ABC73F24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "17008B26-22BF-4B3F-ABF8-92B2F5D1177F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "32711FCB-3289-4A8F-B7FC-2257EFE21FA3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7698F903-4333-40ED-8BE0-4A6BA65E802F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD41225B-801D-4E15-AD1D-E01D819539B2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8330EC8-24F3-473A-B2C3-CD7E4C692EB9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "66E3D59A-B15B-49C7-A1AF-DF98086E45B5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "D1CF69D2-BF00-4164-B86E-381A9FA5A7D2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "0442B096-79AD-4602-A316-224866EEBC3C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AC7ECC0-222B-4BD8-A5E6-A556A94FC779" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE9EB7A3-E580-42F3-A5DC-6A736EF6A760" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1F8E8BC-6C39-4192-9CCC-4054968D1F52" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8C5AF6B0-2743-47F5-8272-65ED205A96F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "77CC8C8F-B091-4777-B27A-5AB022D7262C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0425116B-86B0-40A0-B370-521BA595FD8B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A8054CD-D2FD-4574-ADFC-305CBA8A171C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:celeryproject:celery:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5DB6D76F-96EE-4C3B-8174-9BC659765C16" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/50825", "source": "secalert@redhat.com" }, { "url": "https://github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txt", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "https://github.com/ask/celery/pull/544", "source": "secalert@redhat.com" } ] }