<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unity-Catalog — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unity-catalog/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 17:59:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unity-catalog/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unity Catalog JWT Issuer Validation Bypass Allows User Impersonation (CVE-2026-27478)</title><link>https://feed.craftedsignal.io/briefs/2026-05-unity-catalog-jwt-bypass/</link><pubDate>Mon, 11 May 2026 17:59:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-unity-catalog-jwt-bypass/</guid><description>A critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (CVE-2026-27478), allowing attackers to impersonate any user by forging JWTs with a self-controlled issuer and exchanging them for valid access tokens, granting unauthorized access to catalogs and other resources.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, tracked as CVE-2026-27478, has been identified in the token exchange endpoint (<code>/api/1.0/unity-control/auth/tokens</code>) of Unity Catalog. This vulnerability allows an attacker to completely impersonate any user within the system. The issue arises because the endpoint dynamically fetches the JWKS (JSON Web Key Set) for signature validation based on the issuer (<code>iss</code>) claim in incoming JWTs without validating whether the issuer is a trusted identity provider. Additionally, the implementation does not validate the audience (<code>aud</code>) claim, enabling tokens intended for other services to be used. This bypass has been observed in unitycatalog-server versions 0.4.0 and earlier. Successful exploitation grants unauthorized access to all catalogs, schemas, tables, and other resources accessible to the impersonated user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sets up their own OIDC-compliant server. This server needs to have a valid JWKS endpoint, serving the public key.</li>
<li>The attacker generates an RSA key pair and creates a JWKS containing the public key.</li>
<li>The attacker crafts a malicious JWT. The <code>iss</code> claim is set to the attacker&rsquo;s OIDC server URL. The <code>sub</code> and <code>email</code> claims are set to the email address of the target user in Unity Catalog. The <code>aud</code> claim is optionally set to a value other than &ldquo;unity-catalog&rdquo;.</li>
<li>The crafted JWT is signed with the attacker&rsquo;s private key, using the RS256 algorithm and including the key ID (<code>kid</code>) in the header.</li>
<li>The attacker sends a POST request to the Unity Catalog token exchange endpoint (<code>/api/1.0/unity-control/auth/tokens</code>).</li>
<li>The request includes the <code>grant_type</code> set to <code>urn:ietf:params:oauth:grant-type:token-exchange</code>, the <code>requested_token_type</code> set to <code>urn:ietf:params:oauth:token-type:access_token</code>, the <code>subject_token_type</code> set to <code>urn:ietf:params:oauth:token-type:id_token</code>, and the <code>subject_token</code> set to the crafted JWT.</li>
<li>The Unity Catalog server retrieves the JWKS from the attacker&rsquo;s OIDC server based on the <code>iss</code> claim. It then validates the JWT signature using the public key from the JWKS.</li>
<li>Due to the lack of issuer validation, the server trusts the attacker&rsquo;s JWT and exchanges it for a valid internal access token, effectively impersonating the target user, and allowing unauthorized access to Unity Catalog resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27478 allows an attacker to completely impersonate any user within the Unity Catalog system. This grants the attacker unauthorized access to all catalogs, schemas, tables, and other resources that the impersonated user has permissions to access. The vulnerability affects unitycatalog-server versions 0.4.0 and earlier, potentially impacting all organizations using these vulnerable versions. Data breaches, unauthorized data modification, and complete compromise of the Unity Catalog system are potential outcomes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>maven/io.unitycatalog:unitycatalog-server</code> to a version later than 0.4.0 to remediate CVE-2026-27478.</li>
<li>Monitor network traffic for POST requests to <code>/api/1.0/unity-control/auth/tokens</code> with suspicious <code>subject_token</code> values, using the Sigma rule <code>Detect Unity Catalog JWT Issuer Validation Bypass Attempt</code>.</li>
<li>Implement strict validation of the <code>iss</code> claim in JWTs at the token exchange endpoint to ensure that only trusted identity providers are allowed.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication-bypass</category><category>jwt</category><category>unity-catalog</category></item></channel></rss>