OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the driver during a local user-initiated connection.
To remediate this issue, users should upgrade to version 2.0.5.1 or later.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
14 Apr 2026, 16:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux Amazon athena Odbc Amazon |
|
| References | () https://aws.amazon.com/security/security-bulletins/2026-013-aws/ - Vendor Advisory | |
| References | () https://docs.aws.amazon.com/athena/latest/ug/odbc-v2-driver-release-notes.html - Release Notes | |
| References | () https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Linux/AmazonAthenaODBC-2.1.0.0.rpm - Patch, Product | |
| References | () https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/Intel/AmazonAthenaODBC-2.1.0.0_x86.pkg - Patch, Product | |
| References | () https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/arm/AmazonAthenaODBC-2.1.0.0_arm.pkg - Patch, Product | |
| References | () https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Windows/AmazonAthenaODBC-2.1.0.0.msi - Patch, Product | |
| CPE | cpe:2.3:a:amazon:athena_odbc:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
03 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-03 21:17
Updated : 2026-04-14 16:14
NVD link : CVE-2026-5485
Mitre link : CVE-2026-5485
CVE.ORG link : CVE-2026-5485
JSON object : View
Products Affected
amazon
- athena_odbc
linux
- linux_kernel
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
