Moderate severityNVD Advisory· Published Dec 5, 2011· Updated Apr 29, 2026
CVE-2011-4356
CVE-2011-4356
Description
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effective id but not the real id during processing of the --uid and --gid arguments to celerybeat, celeryd_detach, celeryd-multi, and celeryev, which allows local users to gain privileges via vectors involving crafted code that is executed by the worker process.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
celeryPyPI | >= 2.1.0, < 2.2.8 | 2.2.8 |
celeryPyPI | >= 2.3.0, < 2.3.4 | 2.3.4 |
celeryPyPI | >= 2.4.0, < 2.4.4 | 2.4.4 |
Affected products
17cpe:2.3:a:celeryproject:celery:2.1.0:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:celeryproject:celery:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:celeryproject:celery:2.4.3:*:*:*:*:*:*:*
Patches
353514b158b74Root warning should use getuid not geteuid
1 file changed · +2 −2
celery/apps/worker.py+2 −2 modified@@ -130,9 +130,9 @@ def run(self): self.worker_init() self.redirect_stdouts_to_logger() - if getattr(os, "geteuid", None) and os.geteuid() == 0: + if getattr(os, "getuid", None) and os.getuid() == 0: warnings.warn( - "Running celeryd with superuser privileges is not encouraged!") + "Running celeryd with superuser privileges is discouraged!") if self.discard: self.purge_messages()
73388921731aRoot warning should use getuid not geteuid
1 file changed · +2 −2
celery/apps/worker.py+2 −2 modified@@ -119,9 +119,9 @@ def run(self): self.worker_init() self.redirect_stdouts_to_logger() - if getattr(os, "geteuid", None) and os.geteuid() == 0: + if getattr(os, "getuid", None) and os.getuid() == 0: warnings.warn( - "Running celeryd with superuser privileges is not encouraged!") + "Running celeryd with superuser privileges is discouraged!") if self.discard: self.purge_messages()
e0767e409947Root warning should use getuid not geteuid
1 file changed · +2 −2
celery/apps/worker.py+2 −2 modified@@ -124,9 +124,9 @@ def run(self): self.worker_init() self.redirect_stdouts_to_logger() - if getattr(os, "geteuid", None) and os.geteuid() == 0: + if getattr(os, "getuid", None) and os.getuid() == 0: warnings.warn( - "Running celeryd with superuser privileges is not encouraged!") + "Running celeryd with superuser privileges is discouraged!") if self.discard: self.purge_messages()
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
14- github.com/ask/celery/blob/master/docs/sec/CELERYSA-0001.txtnvdPatch
- github.com/advisories/GHSA-rpc6-h455-3rx5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2011-4356ghsaADVISORY
- github.com/celery/celery/blob/master/docs/sec/CELERYSA-0001.txtghsaWEB
- github.com/celery/celery/commit/53514b158b743678d8993638be5920cd09ccc35cghsaWEB
- github.com/celery/celery/commit/73388921731a0e6feb28ab0d389c4f7dc4d524f6ghsaWEB
- github.com/celery/celery/commit/e0767e40994754fe8482bf4ff622c5c6d0b9f671ghsaWEB
- github.com/celery/celery/pull/544ghsaWEB
- github.com/pypa/advisory-database/tree/main/vulns/celery/PYSEC-2011-17.yamlghsaWEB
- web.archive.org/web/20140722114447/http://secunia.com/advisories/46973ghsaWEB
- web.archive.org/web/20200305001706/http://www.securityfocus.com/bid/50825ghsaWEB
- secunia.com/advisories/46973nvd
- www.securityfocus.com/bid/50825nvd
- github.com/ask/celery/pull/544nvd
News mentions
0No linked articles in our index yet.