Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-17495

Опубликовано: 11 авг. 2020
Источник: debian
EPSS Низкий

Описание

django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-django-celery-resultsunfixedpackage

Примечания

  • https://github.com/celery/django-celery-results/issues/142

  • Disputed upstream as security vulnerablity, as it is up to the developers who uses

  • sensitive information when calling celery tasks to provide suitable replacement argument

  • through argsrepr and kwargsrepr as described in:

  • https://github.com/celery/django-celery-results/issues/154#issuecomment-734706270

EPSS

Процентиль: 35%
0.00148
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.

CVSS3: 7.5
nvd
больше 5 лет назад

django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.

CVSS3: 7.5
github
больше 4 лет назад

django-celery-results Stores Sensitive Information In Cleartext

EPSS

Процентиль: 35%
0.00148
Низкий