apache airflow CVE-2020-13927 is a vulnerability in Apache Airflow
Published on November 10, 2020

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

NVD

Known Exploited Vulnerability

This Apache Airflow's Experimental API Authentication Bypass vulnerability is part of CISA's list of Known Exploited Vulnerabilities. The previous default setting for Airflow's Experimental API was to allow all API requests without authentication.

The following remediation steps are recommended / required by July 18, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2020-13927 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

Insecure Default Initialization of Resource

The software initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.


Products Associated with CVE-2020-13927

You can be notified by stack.watch whenever vulnerabilities like CVE-2020-13927 are published in these products:

 

What versions of Airflow are vulnerable to CVE-2020-13927?