CVE-2025-49827
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-15

Last updated on: 2025-11-04

Assigner: GitHub, Inc.

Description
Conjur provides secrets management and application identity for infrastructure. Conjur OSS versions 1.19.5 through 1.22.0 and Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) 13.1 through 13.5 and 13.6 are vulnerable to bypass of the IAM authenticator. An attacker who can manipulate the headers signed by AWS can take advantage of a malformed regular expression to redirect the authentication validation request that Secrets Manager, Self-Hosted sends to AWS to a malicious server controlled by the attacker. This redirection could result in a bypass of the Secrets Manager, Self-Hosted IAM Authenticator, granting the attacker the permissions granted to the client whose request was manipulated. This issue affects both Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur OSS. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-15
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
cyberark conjur From 1.19.5 (inc) to 1.22.1 (exc)
cyberark conjur From 13.1 (inc) to 13.5.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-807 The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Conjur OSS versions 1.19.5 through 1.22.0 and Secrets Manager, Self-Hosted versions 13.1 through 13.6. An attacker who can manipulate AWS-signed headers can exploit a malformed regular expression to redirect authentication validation requests to a malicious server. This redirection allows the attacker to bypass the IAM authenticator in Secrets Manager, Self-Hosted, potentially gaining the permissions of the client whose request was manipulated.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to bypass the IAM authenticator in Conjur Secrets Manager, Self-Hosted, granting them unauthorized access to permissions associated with a legitimate client. This could lead to unauthorized access to secrets and sensitive infrastructure credentials, potentially compromising the security of your systems and applications.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Conjur OSS to version 1.22.1 or later, and Secrets Manager, Self-Hosted to versions 13.5.1 or 13.6.1 or later, as these versions contain fixes for the IAM authenticator bypass issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart