CVE-2020-13927
Description
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 91 Days)
Missing Authentication for Critical Function
DraftCommon Consequences
Applicable Platforms
Invokable Control Element with Variadic Parameters
IncompleteCommon Consequences
Applicable Platforms
Initialization of a Resource with an Insecure Default
IncompleteCommon Consequences
Applicable Platforms
Apache Airflow 1.10.10 - 'Example Dag' Remote Code …
Apache Airflow 1.10.10 - 'Example Dag' Remote Code Execution
View Exploit Code →Airflow by Apache
cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*