High severityNVD Advisory· Published May 27, 2025· Updated Apr 15, 2026
CVE-2025-5279
CVE-2025-5279
Description
When the Amazon Redshift Python Connector is configured with the BrowserAzureOAuth2CredentialsProvider plugin, the driver skips the SSL certificate validation step for the Identity Provider. An insecure connection could allow an actor to intercept the token exchange process and retrieve an access token.
This issue has been addressed in driver version 2.1.7. Users should upgrade to address this issue and ensure any forked or derivative code is patched to incorporate the new fixes.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
redshift-connectorPyPI | >= 2.0.872, < 2.1.7 | 2.1.7 |
Patches
15bbd061b03cbVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-r244-wg5g-6w2rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-5279ghsaADVISORY
- aws.amazon.com/security/security-bulletinsghsaWEB
- aws.amazon.com/security/security-bulletins/AWS-2025-011ghsaWEB
- github.com/aws/amazon-redshift-python-driver/releases/tag/v2.1.7nvdWEB
- github.com/aws/amazon-redshift-python-driver/security/advisories/GHSA-r244-wg5g-6w2rnvdWEB
- aws.amazon.com/security/security-bulletins/AWS-2025-011/nvd
News mentions
0No linked articles in our index yet.