CVE-2020-13927

KEV
Published: Nov 10, 2020 Last Modified: Ott 23, 2025
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 7,5
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9419
Percentile
1,0th
Updated

EPSS Score Trend (Last 91 Days)

306

Missing Authentication for Critical Function

Draft
Common Consequences
Security Scopes Affected:
Access Control Other
Potential Impacts:
Gain Privileges Or Assume Identity Varies By Context
Applicable Platforms
Technologies: Cloud Computing, ICS/OT
View CWE Details
1056

Invokable Control Element with Variadic Parameters

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Reduce Reliability
Applicable Platforms
All platforms may be affected
View CWE Details
1188

Initialization of a Resource with an Insecure Default

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
All platforms may be affected
View CWE Details
Exploit

Apache Airflow 1.10.10 - 'Example Dag' Remote Code …

Apache Airflow 1.10.10 - 'Example Dag' Remote Code Execution

View Exploit Code →
Application

Airflow by Apache

Version Range Affected
To 1.10.11 (exclusive)
cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020…
http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-…
http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-…
https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc…
http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-…
http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-…
https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc…