Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
References
Link | Resource |
---|---|
https://tprynn.github.io/2022/05/26/flower-vulns.html | Exploit Third Party Advisory |
http://githubcommherflower.com | Broken Link URL Repurposed |
https://github.com/mher/flower/issues/1217 | Exploit Issue Tracking |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://githubcommherflower.com - Broken Link, URL Repurposed |
13 Feb 2024, 17:21
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/mher/flower/issues/1217 - Exploit, Issue Tracking |
Information
Published : 2022-06-02 14:15
Updated : 2024-02-14 01:17
NVD link : CVE-2022-30034
Mitre link : CVE-2022-30034
JSON object : View
Products Affected
flower_project
- flower
CWE
CWE-287
Improper Authentication