CVE: CVE-2022-30034

Export to Word

Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes.

Threat-Mapped Scoring

Score: 3.0

Priority: P2 - Serious (High)

EPSS

Score: 0.0014
Percentile: 0.34791

CVSS Scoring

CVSS v3.1 Score: 8.6

Severity: HIGH

Mapped CWE(s)

All CAPEC(s)

CAPEC(s) with Mapped TTPs

Mapped ATT&CK TTPs

Malware

APTs Threat Group Associations

Campaigns

Affected Products

← Back to Home