External Control of File Name or Path Affecting org.apache.parquet:parquet-avro package, versions [,1.15.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHEPARQUET-10060156
  • published7 May 2025
  • disclosed6 May 2025
  • creditAndrew Pikler,David Handermann,Nándor Kollár

Introduced: 6 May 2025

NewCVE-2025-46762  (opens in a new tab)
CWE-73  (opens in a new tab)

How to fix?

Upgrade org.apache.parquet:parquet-avro to version 1.15.2 or higher.

Overview

Affected versions of this package are vulnerable to External Control of File Name or Path during schema parsing. Although loading untrusted classes is no longer vulnerable via this vector as of version 1.15.1, by default an attacker who can control a trusted class can execute arbitrary code by passing them in as ReflectData or SpecificData Parquet inputs to the schema parser.

Workaround

On version 1.15.1, this vulnerability can be avoided by setting the system property org.apache.parquet.avro.SERIALIZABLE_PACKAGES to an empty string.

CVSS Base Scores

version 4.0
version 3.1