| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859 | ========================================= CELERYSA-0003: Celery Security Advisory=========================================:contact: security@celeryproject.org:CVE id: TBA:date: 2016-12-08 05:00:00 p.m. PSTDetails=======:package: celery:vulnerability: Configuration Error:problem type: remote:risk: low:versions-affected: 4.0.0Description===========The default configuration in Celery 4.0.0 allowed for deserializationof pickled messages, even if the software is configured to sendmessages in the JSON format.The particular configuration in question is the `accept_content` setting,which by default was set to:    app.conf.accept_content = ['json', 'pickle', 'msgpack', 'yaml']The risk is still set to low considering that an attacker would require accessto the message broker used to send messages to Celery workers.Systems affected================Users of Celery version 4.0.0 with no explicit accept_content setting set.Solution========To work around the issue you can explicitly configure the accept_contentsetting:    app.conf.accept_content = ['json']Or you can upgrade to the Celery 4.0.1 version:    $ pip install -U celeryDistribution package maintainers are urged to provide their userswith updated packages.Please direct questions to the celery-users mailing-list:https://groups.google.com/group/celery-users/,or if you're planning to report a new security related issue we request thatyou keep the information confidential by contactingsecurity@celeryproject.org instead.Thank you!
 |