Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q4qm-xhf9-4p8f | Flower OAuth authentication bypass |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T06:40:47.108Z
Reserved: 2022-05-02T00:00:00
Link: CVE-2022-30034
No data.
Status : Modified
Published: 2022-06-02T14:15:51.427
Modified: 2024-11-21T07:02:06.453
Link: CVE-2022-30034
No data.
OpenCVE Enrichment
No data.
Github GHSA