CVE-2021-38540
CRITICAL NUCLEIAirflow >=2.0.0-<2.1.3 - RCE/Info Disclosure
Title source: llmDescription
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.
Exploits (1)
nomisec
WORKING POC
4 stars
by Captain-v-hook · poc
https://github.com/Captain-v-hook/PoC-for-CVE-2021-38540-
Nuclei Templates (1)
Apache Airflow - Unauthenticated Variable Import
CRITICALVERIFIEDby pdteam
Shodan:
title:"Sign In - Airflow" || http.title:"airflow - dags" || http.html:"apache airflow" || http.title:"sign in - airflow" || product:"redis"
FOFA:
title="sign in - airflow" || apache airflow || title="airflow - dags" || http.html:"apache airflow"
References (2)
Scores
CVSS v3
9.8
EPSS
0.9178
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-269
CWE-306
Status
published
Products (2)
apache/airflow
2.0.0 - 2.1.3
pypi/apache-airflow
2.0.0 - 2.1.3PyPI
Published
Sep 09, 2021
Tracked Since
Feb 18, 2026