CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
76.9%
pyarrow is vulnerable to Deserialization Of Untrusted Data. The vulnerability due to the Arrow IPC, Feather or Parquet data from untrusted sources as the library does not by default disable the PyExtensionType
autoloading. This allows an attacker to create PyArrow-specific extension types which leads to arbitrary code execution from untrusted data sources.
github.com/advisories/GHSA-5wvp-7f3h-6wmm
github.com/apache/arrow/commit/f14170976372436ec1d03a724d8d3f3925484ecf
lists.apache.org/thread/yhy7tdfjf9hrl9vfrtzo8p2cyjq87v7n
lists.fedoraproject.org/archives/list/[email protected]/message/FR34AIPXVTMB3XPRU5ULV5HHWPMRE33X/
lists.fedoraproject.org/archives/list/[email protected]/message/MAGWEAJDWO2ACYATUQCPXLSYY5C3L3XU/
lists.fedoraproject.org/archives/list/[email protected]/message/MWFYXLVBTBHNKYRXI572RFX7IJDDQGBL/
pypi.org/project/pyarrow-hotfix/