CVE-2022-30034

Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.
References
Link Resource
http://githubcommherflower.com Broken Link URL Repurposed
https://github.com/mher/flower/issues/1217 Exploit Issue Tracking
https://tprynn.github.io/2022/05/26/flower-vulns.html Exploit Third Party Advisory
http://githubcommherflower.com Broken Link URL Repurposed
https://github.com/mher/flower/issues/1217 Exploit Issue Tracking
https://tprynn.github.io/2022/05/26/flower-vulns.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:flower_project:flower:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () http://githubcommherflower.com - Broken Link, URL Repurposed () http://githubcommherflower.com - Broken Link, URL Repurposed
References () https://github.com/mher/flower/issues/1217 - Exploit, Issue Tracking () https://github.com/mher/flower/issues/1217 - Exploit, Issue Tracking
References () https://tprynn.github.io/2022/05/26/flower-vulns.html - Exploit, Third Party Advisory () https://tprynn.github.io/2022/05/26/flower-vulns.html - Exploit, Third Party Advisory

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://githubcommherflower.com - Broken Link (MISC) http://githubcommherflower.com - Broken Link, URL Repurposed

13 Feb 2024, 17:21

Type Values Removed Values Added
References (MISC) https://github.com/mher/flower/issues/1217 - Third Party Advisory (MISC) https://github.com/mher/flower/issues/1217 - Exploit, Issue Tracking

Information

Published : 2022-06-02 14:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30034

Mitre link : CVE-2022-30034

CVE.ORG link : CVE-2022-30034


JSON object : View

Products Affected

flower_project

  • flower
CWE
CWE-287

Improper Authentication