Skip to main content

CVE-2025-46762: CWE-73 External Control of File Name or Path in Apache Software Foundation Apache Parquet Java

High
VulnerabilityCVE-2025-46762cvecve-2025-46762cwe-73
Published: Tue May 06 2025 (05/06/2025, 09:08:13 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache Parquet Java

Description

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code. While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed. The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted) Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:56:01 UTC

Technical Analysis

CVE-2025-46762 is a high-severity vulnerability in the Apache Parquet Java library, specifically within the parquet-avro module versions up to 1.15.0. The vulnerability arises from unsafe schema parsing that allows external control of file names or paths (CWE-73), enabling attackers to execute arbitrary code. The root cause is the deserialization of untrusted classes when using the "specific" or "reflect" data models for reading Parquet files. Although version 1.15.1 introduced a fix to restrict untrusted packages, the default configuration still permits execution of malicious classes from trusted packages, leaving a residual attack surface. The "generic" model is not affected. Exploitation requires the client application to use the vulnerable data models and to process crafted Parquet files containing malicious payloads. The vulnerability can be mitigated by upgrading to version 1.15.2, which fully addresses the issue, or by setting the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string in version 1.15.1 to disable deserialization of potentially harmful classes. The CVSS 4.0 score of 7.1 reflects a high severity with network attack vector, low attack complexity, partial authentication required, and user interaction needed. The vulnerability impacts confidentiality, integrity, and availability due to potential arbitrary code execution within the context of the affected application.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying on Apache Parquet Java for big data processing, analytics, or data warehousing solutions. Exploitation could lead to unauthorized code execution, enabling attackers to compromise sensitive data, disrupt data processing pipelines, or pivot within internal networks. Given the widespread adoption of Apache Parquet in data-intensive industries such as finance, telecommunications, healthcare, and government sectors across Europe, the impact could be substantial. Attackers could leverage this vulnerability to exfiltrate confidential information, manipulate data integrity, or cause denial of service by crashing critical data services. The requirement for user interaction and partial authentication reduces the risk somewhat but does not eliminate it, particularly in environments where trusted users handle Parquet files from external sources. The vulnerability's presence in widely used open-source software increases the likelihood of targeted attacks or supply chain compromises affecting European enterprises.

Mitigation Recommendations

European organizations should prioritize upgrading Apache Parquet Java to version 1.15.2 immediately to fully remediate the vulnerability. For environments where immediate upgrade is not feasible, setting the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on version 1.15.1 is a critical interim mitigation to prevent deserialization of untrusted classes. Additionally, organizations should implement strict validation and sanitization of all Parquet files ingested from external or untrusted sources. Employing network segmentation and least privilege principles can limit the impact of potential exploitation. Monitoring and logging deserialization activities and anomalous behaviors within data processing systems can help detect exploitation attempts early. Security teams should also review and update incident response plans to address potential exploitation scenarios involving big data processing components. Finally, educating developers and data engineers about safe usage patterns of the parquet-avro module, specifically avoiding the "specific" and "reflect" models with untrusted data, will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-04-29T02:49:04.253Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9d4f

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:56:01 PM

Last updated: 7/28/2025, 7:23:15 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats