HTTP: Apache Airflow Experimental API Authentication Bypass

This signature detects attempts to exploit a known vulnerability against Apache Airflow. A successful attack can lead to security bypass.

Extended Description

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

Affected Products

Apache airflow

References

CVE: CVE-2020-13927

Short Name
HTTP:APACHE:AIRFLOW-API-AUTH-BY
Severity
Warning
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
API Airflow Apache Authentication Bypass CVE-2020-13927 Experimental
Release Date
06/19/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3819
False Positive
Unknown
Vendors

Apache

Found a potential security threat?