.. / CVE-2020-13927

Exploit for Airflow Experimental <1.10.11 - REST API Auth Bypass (CVE-2020-13927)

Description:

Airflow’s Experimental API prior 1.10.11 allows all API requests without authentication.

Nuclei Template

View the template here CVE-2020-13927.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-13927.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2020-13927
https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E
http://packetstormsecurity.com/files/174764/Apache-Airflow-1.10.10-Remote-Code-Execution.html
https://airflow.apache.org/docs/1.10.11/security.html#api-authenticatio
http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html