First published: Mon Dec 21 2020(Updated: )
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <1.10.14 | |
pip/apache-airflow | <1.10.14 | 1.10.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-17526.
The title of the vulnerability is 'Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config.'
The severity of CVE-2020-17526 is high, with a severity value of 7.7.
Apache Airflow Webserver versions prior to 1.10.14 with default config are affected by CVE-2020-17526.
To fix CVE-2020-17526, it is recommended to update Apache Airflow Webserver to version 1.10.14 or higher.