A most severity safety vulnerability has been disclosed in Apache Parquet’s Java Library that, if efficiently exploited, might permit a distant attacker to execute arbitrary code on vulnerable cases.
Apache Parquet is a free and open-source columnar knowledge file format that is designed for environment friendly knowledge processing and retrieval, offering help for advanced knowledge, high-performance compression, and encoding schemes. It was first launched in 2013.
The vulnerability in query is tracked as CVE-2025-30065. It carries a CVSS rating of 10.0.
“Schema parsing within the parquet-avro module of Apache Parquet 1.15.0 and former variations permits dangerous actors to execute arbitrary code,” the mission maintainers mentioned in an advisory.
In keeping with Endor Labs, profitable exploitation of the flaw requires tricking a susceptible system into studying a specifically crafted Parquet file to acquire code execution.
“This vulnerability can impression knowledge pipelines and analytics programs that import Parquet information, significantly when these information come from exterior or untrusted sources,” the corporate said. “If attackers can tamper with the information, the vulnerability could also be triggered.”
The shortcoming impacts all variations of the software program as much as and together with 1.15.0. It has been addressed in model 1.15.1. Keyi Li of Amazon has been credited with discovering and reporting the flaw.
Whereas there is no such thing as a proof that the flaw has been exploited within the wild, vulnerabilities in Apache initiatives have turn into a lightning rod for menace actors seeking to opportunistically breach programs and deploy malware.
Final month, a essential safety flaw in Apache Tomcat (CVE-2025-24813, CVSS rating: 9.8) came under active exploitation inside 30 hours of public disclosure.
Cloud safety agency Aqua, in an evaluation revealed this week, mentioned it found a brand new assault marketing campaign that targets Apache Tomcat servers with easy-to-guess credentials to deploy encrypted payloads which might be designed to steal SSH credentials for lateral motion and in the end hijack the system assets for illicit cryptocurrency mining.
The payloads are additionally able to establishing persistence and performing as a Java-based internet shell that “allows the attacker to execute arbitrary Java code on the server,” Assaf Morag, director of menace intelligence at Aqua, said.
“As well as, the script is designed to examine if the person has root privileges and in that case it executes two capabilities that optimize CPU consumption for higher cryptomining outcomes.”
The marketing campaign, which impacts each Home windows and Linux programs, is probably going assessed to be the work of a Chinese language-speaking menace actor owing to the presence of Chinese language language feedback within the supply code.
Source link