Home

Description

OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the driver during a local user-initiated connection. To remediate this issue, users should upgrade to version 2.0.5.1 or later.

PUBLISHED Reserved 2026-04-03 | Published 2026-04-03 | Updated 2026-04-07 | Assigner AMZN




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

HIGH: 7.3CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper neutralization of special elements used in an OS command ('OS command injection')

Product status

Default status
unaffected

2.0.5.1
unaffected

References

aws.amazon.com/security/security-bulletins/2026-013-aws/ vendor-advisory

downloads.athena.us-east-1.amazonaws.com/...ODBC-2.1.0.0.msi patch

downloads.athena.us-east-1.amazonaws.com/...ODBC-2.1.0.0.rpm patch

downloads.athena.us-east-1.amazonaws.com/...-2.1.0.0_arm.pkg patch

downloads.athena.us-east-1.amazonaws.com/...-2.1.0.0_x86.pkg patch

docs.aws.amazon.com/.../ug/odbc-v2-driver-release-notes.html release-notes

cve.org (CVE-2026-5485)

nvd.nist.gov (CVE-2026-5485)

Download JSON