The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue affects Apache Airflow 2.0.0.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/02/17/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-02-17 07:15
Updated : 2022-08-03 03:13
NVD link : CVE-2021-26697
Mitre link : CVE-2021-26697
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
apache
- airflow