Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <df29bdb1-da27-5f0d-fcd8-4d4db69b79e9@apache.org>
Date: Tue, 19 May 2026 18:08:11 +0000
From: Vincent Beck <vincbeck@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-42526: Apache Airflow Amazon provider: Prevent
 unauthorized access to team-scoped secrets in AWS Secrets Manager and SSM
 Parameter Store backends 

Severity: low 

Affected versions:

- Apache Airflow Amazon provider (apache-airflow-providers-amazon) before 9.28.0

Description:

In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.

Credit:

Justin Pakzad (remediation developer)

References:

https://github.com/apache/airflow/pull/65703
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-42526

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.