Skip to content

django-celery-results Stores Sensitive Information In Cleartext

High severity GitHub Reviewed Published Jun 4, 2021 to the GitHub Advisory Database • Updated Aug 30, 2023

Package

pip django-celery-results (pip)

Affected versions

< 2.4.0

Patched versions

2.4.0

Description

django-celery-results prior to 2.4.0 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.

In version 2.4.0 this is no longer the default behaviour but can be re-enabled with the result_extended flag in which case care should be taken to ensure any sensitive variables are scrubbed - see here for an example.

References

Published by the National Vulnerability Database Aug 11, 2020
Reviewed May 17, 2021
Published to the GitHub Advisory Database Jun 4, 2021
Last updated Aug 30, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2020-17495

GHSA ID

GHSA-fvx8-v524-8579

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.