CVE-2024-42447

9.8 CRITICAL

📋 TL;DR

This vulnerability in Apache Airflow's FAB provider prevents users from logging out, potentially allowing unauthorized access to sessions. It affects Airflow installations using FAB provider versions 1.2.0 or 1.2.1 (specifically with Airflow 2.9.3). Attackers could hijack active sessions to gain unauthorized access to Airflow instances.

💻 Affected Systems

Products:
  • Apache Airflow
  • Apache Airflow Providers FAB
Versions: FAB provider 1.2.0 (all Airflow versions), FAB provider 1.2.1 (only with Airflow 2.9.3)
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Early Airflow 2.9.3 container images and constraint files included vulnerable FAB 1.2.1 version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent access to Airflow admin interfaces, potentially compromising data pipelines, stealing credentials, or disrupting critical workflows.

🟠

Likely Case

Unauthorized users maintain access to Airflow UI after legitimate users think they've logged out, leading to data exposure and privilege escalation.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Airflow instance itself rather than broader infrastructure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to an active session, but logout prevention makes session hijacking easier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apache Airflow Providers FAB 1.2.2

Vendor Advisory: https://lists.apache.org/thread/2zoo8cjlwfjhbfdxfgltcm0hnc0qmc52

Restart Required: Yes

Instructions:

1. Upgrade to FAB provider 1.2.2 using pip: 'pip install --upgrade apache-airflow-providers-fab==1.2.2' 2. Restart Airflow services 3. For container deployments, pull latest Airflow images or rebuild with updated constraints

🔧 Temporary Workarounds

Force session timeout

all

Configure shorter session timeouts to limit exposure

Set AIRFLOW__WEBSERVER__SESSION_LIFETIME_MINUTES to lower value in airflow.cfg

🧯 If You Can't Patch

  • Implement network segmentation to restrict Airflow access to trusted users only
  • Monitor for unusual session activity and implement additional authentication layers

🔍 How to Verify

Check if Vulnerable:

Check FAB provider version: 'pip show apache-airflow-providers-fab' and verify if using 1.2.0 or 1.2.1 (with Airflow 2.9.3)

Check Version:

pip show apache-airflow-providers-fab | grep Version

Verify Fix Applied:

Confirm FAB provider version is 1.2.2 or higher and test logout functionality

📡 Detection & Monitoring

Log Indicators:

  • Failed logout attempts
  • Unusually long session durations
  • Multiple sessions from same user

Network Indicators:

  • Repeated authentication requests without logout events

SIEM Query:

source="airflow" AND (event="logout_failed" OR session_duration>24h)

🔗 References

📤 Share & Export