Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5wvp-7f3h-6wmm

Опубликовано: 09 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

PyArrow: Arbitrary code execution when loading a malicious data file

Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files).

This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings.

It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon.

If it is not possible to upgrade, maintainers provide a separate package pyarrow-hotfix that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.

Пакеты

Наименование

pyarrow

pip
Затронутые версииВерсия исправления

>= 0.14.0, < 14.0.1

14.0.1

EPSS

Процентиль: 99%
0.8564
Высокий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
около 2 лет назад

Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon. If it is not possible to upgrade, we provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.

CVSS3: 9.8
debian
около 2 лет назад

Deserialization of untrusted data in IPC and Parquet readers in PyArro ...

CVSS3: 9.8
fstec
около 2 лет назад

Уязвимость библиотеки PyArrow, связанная с считыванием данных из недостоверных источников, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.8564
Высокий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-502