In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.apache.parquet:parquet-avro
to version 1.15.2 or higher.
Affected versions of this package are vulnerable to External Control of File Name or Path during schema parsing. Although loading untrusted classes is no longer vulnerable via this vector as of version 1.15.1, by default an attacker who can control a trusted class can execute arbitrary code by passing them in as ReflectData
or SpecificData
Parquet inputs to the schema parser.
On version 1.15.1, this vulnerability can be avoided by setting the system property org.apache.parquet.avro.SERIALIZABLE_PACKAGES
to an empty string.