| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859 | 
							- =========================================
 
-  CELERYSA-0003: Celery Security Advisory
 
- =========================================
 
- :contact: security@celeryproject.org
 
- :CVE id: TBA
 
- :date: 2016-12-08 05:00:00 p.m. PST
 
- Details
 
- =======
 
- :package: celery
 
- :vulnerability: Configuration Error
 
- :problem type: remote
 
- :risk: low
 
- :versions-affected: 4.0.0
 
- Description
 
- ===========
 
- The default configuration in Celery 4.0.0 allowed for deserialization
 
- of pickled messages, even if the software is configured to send
 
- messages in the JSON format.
 
- The particular configuration in question is the `accept_content` setting,
 
- which by default was set to:
 
-     app.conf.accept_content = ['json', 'pickle', 'msgpack', 'yaml']
 
- The risk is still set to low considering that an attacker would require access
 
- to the message broker used to send messages to Celery workers.
 
- Systems affected
 
- ================
 
- Users of Celery version 4.0.0 with no explicit accept_content setting set.
 
- Solution
 
- ========
 
- To work around the issue you can explicitly configure the accept_content
 
- setting:
 
-     app.conf.accept_content = ['json']
 
- Or you can upgrade to the Celery 4.0.1 version:
 
-     $ pip install -U celery
 
- Distribution package maintainers are urged to provide their users
 
- with updated packages.
 
- Please direct questions to the celery-users mailing-list:
 
- http://groups.google.com/group/celery-users/,
 
- or if you're planning to report a new security related issue we request that
 
- you keep the information confidential by contacting
 
- security@celeryproject.org instead.
 
- Thank you!
 
 
  |