CVE-2020-17526

HIGH NUCLEI

Apache Airflow Webserver <1.10.14 - Info Disclosure

Title source: llm

Description

Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.

Nuclei Templates (1)

Apache Airflow <1.10.14 - Authentication Bypass
HIGHVERIFIEDby piyushchhiroliya
Shodan: http.title:"airflow - dags" || http.html:"apache airflow" || http.title:"sign in - airflow" || product:"redis"
FOFA: Apache Airflow || apache airflow || title="airflow - dags" || http.html:"apache airflow" || title="sign in - airflow"

Scores

CVSS v3 7.7
EPSS 0.9166
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Details

Status published
Products (2)
apache/airflow < 1.10.14
pypi/apache-airflow 0 - 1.10.14PyPI
Published Dec 21, 2020
Tracked Since Feb 18, 2026