Description
Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
Published: 2022-05-31
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q4qm-xhf9-4p8f Flower OAuth authentication bypass
History

No history.

Subscriptions

Flower Project Flower
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:40:47.108Z

Reserved: 2022-05-02T00:00:00.000Z

Link: CVE-2022-30034

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-02T14:15:51.427

Modified: 2024-11-21T07:02:06.453

Link: CVE-2022-30034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses