Apache Parquet Java中发现高危漏洞:CVE-2025-46762
Apache Parquet Java发现高危漏洞CVE-2025-46762,影响parquet-avro模块,导致远程代码执行。该漏洞源于不安全的模式解析机制,允许攻击者通过恶意Parquet文件触发代码执行。建议升级至Parquet Java 1.15.2或调整配置以限制信任包,并优先采用“generic” Avro模型以避免风险。未修补系统面临供应链攻击威胁。 2025-5-5 07:22:4 Author: gbhackers.com(查看原文) 阅读量:38 收藏

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using the parquet-avro module to remote code execution (RCE) attacks.

The flaw, disclosed by Apache Parquet contributor Gang Wu on May 2, 2025, impacts versions up to and including 1.15.1.

Technical Breakdown of the Vulnerability

The vulnerability stems from insecure schema parsing in the parquet-avro module. Attackers could embed malicious code within Parquet file metadata, which executes automatically when a vulnerable system reads the file’s Avro schema.

- Advertisement - Google News

While Apache Parquet 1.15.1 introduced partial mitigations by restricting untrusted packages, its default “trusted packages” configuration still permits code execution from pre-approved Java packages (e.g., java.util).

  • Requires use of the specific” or “reflect data models (not the safer “generic” model).
  • Vulnerable systems must process attacker-controlled Parquet files.

Affected Systems

  • All Apache Parquet Java versions ≤ 1.15.1.
  • Applications leveraging parquet-avro for deserialization in big data frameworks like Apache Spark, Hadoop, or Flink.

Mitigation Strategies

The Apache Software Group recommends immediate action:

  1. Upgrade to Parquet Java 1.15.2, which fully resolves the issue by tightening package trust boundaries.
  2. For systems stuck on 1.15.1, set the JVM system property:
    -Dorg.apache.parquet.avro.SERIALIZABLE_PACKAGES= (empty string).

Organizations should also audit data pipelines to ensure the “generic” Avro model is used where possible, as it is immune to this exploit.

Security experts warn that unpatched systems are at risk of supply chain attacks, where corrupted Parquet files trigger backend exploits.

“This is a textbook example of how serialization vulnerabilities can bypass perimeter defenses,” said Maria Chen, CTO of cybersecurity firm DataShield. “Attackers could weaponize common data formats to infiltrate analytics platforms.”

The Apache team has released updated documentation emphasizing secure configuration practices for Avro schema handling.

Organizations handling sensitive data are urged to prioritize patching, as proof-of-concept exploits for similar vulnerabilities often emerge within days of public disclosure.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.


文章来源: https://gbhackers.com/apache-parquet-java-vulnerability/
如有侵权请联系:admin#unsafe.sh