E24-9uxz1
CVSS:
9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2020
Description
This strike exploits an authentication bypass vulnerability in Apache Airflow. The default setting for airflow's experimental API allows all API requests without authentication. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request to apache airflow to perform malicious actions such as creating a vulnerable DAG(Directed Acyclic Graph).
*NOTE: This CVE combined with CVE-2020-11978 allows vulnerable DAG creation and command injection, leading to unauthenticated remote code execution.
CVE
References
https://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html