### [CVE-2020-17526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17526) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Airflow&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20Airflow%3C%201.10.14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Incorrect%20Session%20Validation%20in%20Airflow%20Webserver%20with%20default%20config&color=brighgreen) ### Description Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/CLincat/vulcat - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/t0m4too/t0m4to