在广泛使用的Apache Parquet中发现严重程度最高的RCE漏洞。
Max severity RCE flaw discovered in widely used Apache Parquet

原始链接: https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/

Apache Parquet 版本 1.15.0 及之前的版本存在一个严重的远程代码执行 (RCE) 漏洞,CVE-2025-30065。此漏洞允许攻击者通过利用特制 Parquet 文件中不可信数据的反序列化来执行任意代码。其 CVSS v4 评分为 10.0,成功利用可能导致系统控制、数据泄露/修改、服务中断或勒索软件部署。 该漏洞可能早在 1.8.0 版本就已存在,由亚马逊研究员 Keyi Li 发现,并在 1.15.1 版本中得到修复。利用此漏洞需要诱骗系统导入恶意 Parquet 文件。 鉴于 Parquet 在大数据环境(Hadoop、AWS、Azure、数据湖)中的广泛使用,其影响可能非常重大。虽然目前尚未发现任何活跃的利用情况,但其严重性和普遍性要求立即采取行动。强烈建议用户升级到 1.15.1 版本。如果无法立即升级,则必须对来自不受信任来源的 Parquet 文件进行验证并加强监控,以此作为缓解措施。

Apache Parquet Java库中发现了一个严重的远程代码执行(RCE)漏洞。该漏洞影响1.15.0及更早版本(可能追溯到1.8.0),源于Java反序列化,允许任意类实例化和潜在的反弹shell访问。这会影响直接使用该库的系统,或通过Hadoop、Spark和Flink等大数据框架间接使用的系统。“修复”方法包括删除有问题的代码。有用户询问pandas是否受影响,因为它内部使用了parquet,但其他人指出pandas是用Python/C实现的,不使用Java/JVM。但是,通常建议检查供应商或开发者以确认软件堆栈是否使用了存在漏洞的Parquet Java库。
相关文章

原文

Apache

A maximum severity remote code execution (RCE) vulnerability has been discovered impacting all versions of Apache Parquet up to and including 1.15.0.

The problem stems from the deserialization of untrusted data that could allow attackers with specially crafted Parquet files to gain control of target systems, exfiltrate or modify data, disrupt services, or introduce dangerous payloads such as ransomware.

The vulnerability is tracked under CVE-2025-30065 and has a CVSS v4 score of 10.0. The flaw was fixed with the release of Apache version 1.15.1.

It should be noted that to exploit this flaw, threat actors must convince someone to import a specially crafted Parquet file.

Severe threat to "big data" environments

Apache Parquet is an open-source, columnar storage format designed for efficient data processing. Unlike row-based formats (like CSV), Parquet stores data by columns, which makes it faster and more space-efficient for analytical workloads.

It is widely adopted across the data engineering and analytics ecosystem, including big data platforms like Hadoop, AWS, Amazon, Google, and Azure cloud services, data lakes, and ETL tools.

Some large companies that use Parquet include Netflix, Uber, Airbnb, and LinkedIn.

The security problem in Parquet was disclosed on April 1, 2025, following a responsible disclosure by its finder, Amazon researcher Keyi Li.

"Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code," warned the short bulletin published on Openwall.

"Users are recommended to upgrade to version 1.15.1, which fixes the issue."

A separate bulletin by Endor Labs highlights the risk of CVE-2025-30065 exploitation more clearly, warning that the flaw can impact any data pipelines and analytics systems that import Parquet files, with the risk being significant for files sourced from external points.

Endor Labs believes the problem was introduced in Parquet version 1.8.0, though older releases might also be impacted. The firm suggests coordinated checks with developers and vendors to determine what Praquet versions are used in production software stacks.

"If an attacker tricks a vulnerable system into reading a specially crafted Parquet file, they could gain remote code execution (RCE) on that system," warns Endor Labs.

However, the security firm avoids over-inflating the risk by including the note, "Despite the frightening potential, it's important to note that the vulnerability can only be exploited if a malicious Parquet file is imported."

That being said, if upgrading to Apache Parquet 1.15.1 immediately is impossible, it is suggested to avoid untrusted Parquet files or carefully validate their safety before processing them. Also, monitoring and logging on systems that handle Parquet processing should be increased.

Although no active exploitation has been discovered yet, the risk is high due to the flaw's severity and the widespread use of Parquet files in big data applications.

Administrators of impacted systems are recommended to upgrade to Parquet version 1.15.1, which addresses CVE-2025-30065, as soon as possible.

Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

联系我们 contact @ memedata.com