|
@@ -0,0 +1,59 @@
|
|
|
+=========================================
|
|
|
+ CELERYSA-0003: Celery Security Advisory
|
|
|
+=========================================
|
|
|
+:contact: security@celeryproject.org
|
|
|
+:CVE id: TBA
|
|
|
+:date: 2016-12-08 05:00:00 p.m. PST
|
|
|
+
|
|
|
+Details
|
|
|
+=======
|
|
|
+
|
|
|
+:package: celery
|
|
|
+:vulnerability: Configuration Error
|
|
|
+:problem type: remote
|
|
|
+:risk: low
|
|
|
+:versions-affected: 4.0.0
|
|
|
+
|
|
|
+Description
|
|
|
+===========
|
|
|
+
|
|
|
+The default configuration in Celery 4.0.0 allowed for deserialization
|
|
|
+of pickled messages, even if the software is configured to send
|
|
|
+messages in the JSON format.
|
|
|
+
|
|
|
+The particular configuration in question is the `accept_content` setting,
|
|
|
+which by default was set to:
|
|
|
+
|
|
|
+ app.conf.accept_content = ['json', 'pickle', 'msgpack', 'yaml']
|
|
|
+
|
|
|
+The risk is still set to low considering that an attacker would require access
|
|
|
+to the message broker used to send messages to Celery workers.
|
|
|
+
|
|
|
+Systems affected
|
|
|
+================
|
|
|
+
|
|
|
+Users of Celery version 4.0.0 with no explicit accept_content setting set.
|
|
|
+
|
|
|
+Solution
|
|
|
+========
|
|
|
+
|
|
|
+To work around the issue you can explicitly configure the accept_content
|
|
|
+setting:
|
|
|
+
|
|
|
+ app.conf.accept_content = ['json']
|
|
|
+
|
|
|
+Or you can upgrade to the Celery 4.0.1 version:
|
|
|
+
|
|
|
+ $ pip install -U celery
|
|
|
+
|
|
|
+Distribution package maintainers are urged to provide their users
|
|
|
+with updated packages.
|
|
|
+
|
|
|
+Please direct questions to the celery-users mailing-list:
|
|
|
+http://groups.google.com/group/celery-users/,
|
|
|
+
|
|
|
+or if you're planning to report a new security related issue we request that
|
|
|
+you keep the information confidential by contacting
|
|
|
+security@celeryproject.org instead.
|
|
|
+
|
|
|
+Thank you!
|