CVE-2021-26697: Improper Authentication in Apache Airflow
(updated )
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0.
References
- github.com/advisories/GHSA-fh37-cx83-q542
- github.com/apache/airflow
- github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76
- github.com/apache/airflow/commit/24a54242d56058846c7978130b3f37ca045d5142
- github.com/apache/airflow/commit/93957e917ff4cfb0be11aef088bd9527cf728a04
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2021-3.yaml
- lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E
- lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E
- lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E
- lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2021-26697
Detect and mitigate CVE-2021-26697 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →