CVE-2023-47248 – pyarrow
Package
Manager: pip
Name: pyarrow
Vulnerable Version: >=0.14.0 <14.0.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.87691 pctl0.99432
Details
PyArrow: Arbitrary code execution when loading a malicious data file Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon. If it is not possible to upgrade, maintainers provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.
Metadata
Created: 2023-11-09T09:30:26Z
Modified: 2024-10-21T20:52:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-5wvp-7f3h-6wmm/GHSA-5wvp-7f3h-6wmm.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-5wvp-7f3h-6wmm
Finding: F096
Auto approve: 1