Lucene search

K
vulnrichmentApacheVULNRICHMENT:CVE-2020-13927
HistoryNov 10, 2020 - 12:00 a.m.

CVE-2020-13927

2020-11-1000:00:00
apache
github.com
5
airflow
api
security risks
authentication
config
cve-2020-13927

AI Score

6.8

Confidence

Low

EPSS

0.967

Percentile

99.7%

SSVC

Exploitation

active

Automatable

yes

Technical Impact

total

The previous default setting for Airflow’s Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default [api]auth_backend = airflow.api.auth.backend.deny_all as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
    ],
    "vendor": "apache",
    "product": "airflow",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.10.11",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

6.8

Confidence

Low

EPSS

0.967

Percentile

99.7%

SSVC

Exploitation

active

Automatable

yes

Technical Impact

total