Apache Airflow Experimental API Authentication Bypass

Strike ID:
E24-9uxz1
CVSS:
9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2020

Description

This strike exploits an authentication bypass vulnerability in Apache Airflow. The default setting for airflow's experimental API allows all API requests without authentication. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request to apache airflow to perform malicious actions such as creating a vulnerable DAG(Directed Acyclic Graph). *NOTE: This CVE combined with CVE-2020-11978 allows vulnerable DAG creation and command injection, leading to unauthenticated remote code execution.

CVE

References