Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q4qm-xhf9-4p8f Flower OAuth authentication bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:40:47.108Z

Reserved: 2022-05-02T00:00:00

Link: CVE-2022-30034

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-02T14:15:51.427

Modified: 2024-11-21T07:02:06.453

Link: CVE-2022-30034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.