The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue affects Apache Airflow 2.0.0.
References
Configurations
History
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
03 Aug 2022, 10:13
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 |
23 Feb 2021, 17:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
References | (MISC) https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/02/17/2 - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:apache:airflow:2.0.0:*:*:*:*:*:*:* | |
CWE | CWE-287 |
17 Feb 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Feb 2021, 16:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-02-17 15:15
Updated : 2023-12-10 13:41
NVD link : CVE-2021-26697
Mitre link : CVE-2021-26697
CVE.ORG link : CVE-2021-26697
JSON object : View
Products Affected
apache
- airflow