GHSA-53wx-pr6q-m3j5

Suggest an improvement
Source
https://github.com/advisories/GHSA-53wx-pr6q-m3j5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-53wx-pr6q-m3j5/GHSA-53wx-pr6q-m3j5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-53wx-pr6q-m3j5
Aliases
  • CVE-2025-46762
Published
2025-05-06T12:30:23Z
Modified
2025-05-06T17:57:37.806590Z
Severity
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/S:N/RE:M/U:Amber CVSS Calculator
Summary
Apache Parquet Java: Potential malicious code execution from trusted packages in the parquet-avro module when reading an Avro schema from a Parquet file metadata
Details

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code.

While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed.

The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted)

Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.

Database specific
{
    "nvd_published_at": "2025-05-06T10:15:16Z",
    "cwe_ids": [
        "CWE-73"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-05-06T16:46:15Z"
}
References

Affected packages

Maven / org.apache.parquet:parquet-avro

Package

Name
org.apache.parquet:parquet-avro
View open source insights on deps.dev
Purl
pkg:maven/org.apache.parquet/parquet-avro

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.2

Affected versions

1.*

1.7.0
1.8.0
1.8.1
1.8.2
1.8.3
1.9.0
1.10.0
1.10.1
1.11.0
1.11.1
1.11.2
1.12.0
1.12.1
1.12.2
1.12.3
1.13.0
1.13.1
1.14.0
1.14.1
1.14.2
1.14.3
1.14.4
1.15.0
1.15.1