CVE-2020-17526
HIGH NUCLEIApache Airflow Webserver <1.10.14 - Info Disclosure
Title source: llmDescription
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.
Nuclei Templates (1)
Apache Airflow <1.10.14 - Authentication Bypass
HIGHVERIFIEDby piyushchhiroliya
Shodan:
http.title:"airflow - dags" || http.html:"apache airflow" || http.title:"sign in - airflow" || product:"redis"
FOFA:
Apache Airflow || apache airflow || title="airflow - dags" || http.html:"apache airflow" || title="sign in - airflow"
References (3)
Scores
CVSS v3
7.7
EPSS
0.9166
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Details
Status
published
Products (2)
apache/airflow
< 1.10.14
pypi/apache-airflow
0 - 1.10.14PyPI
Published
Dec 21, 2020
Tracked Since
Feb 18, 2026