|
|
Message-ID: <e94b50ef-bebb-e821-6721-b812d1afb97e@apache.org> Date: Mon, 09 Mar 2026 10:36:45 +0000 From: Jarek Potiuk <potiuk@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-25604: Apache Airflow AWS Auth Manager - Host Header Injection Leading to SAML Authentication Bypass Severity: medium Affected versions: - Apache Airflow Providers Amazon (apache-airflow-providers-amazon) 8.0.0 before 9.22.0 Description: In AWS Auth manager, the origin of the SAML authentication has been used as provided by the client and not verified against the actual instance URL. This allowed to gain access to different instances with potentially different access controls by reusing SAML response from other instances. You should upgrade to 9.22.0 version of provider if you use AWS Auth Manager. Credit: Sungwuk Jung (finder) References: https://github.com/apache/airflow/pull/61368 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-25604
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.