Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    AI Agents Now Write Code in Parallel: OpenAI Introduces Codex, a Cloud-Based Coding Agent Inside ChatGPT

    May 16, 2025

    Linux Boot Process? Best Geeks Know It!

    May 16, 2025

    Microsoft’s Surface lineup reportedly losing another of its most interesting designs

    May 16, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Apache Parquet exploit tool detect servers vulnerable to critical flaw
    Cyber Security

    Apache Parquet exploit tool detect servers vulnerable to critical flaw

    MichaBy MichaMay 7, 2025Updated:May 8, 2025No Comments3 Mins Read


    Apache Parquet exploit tool detect servers vulnerable to critical flaw

    A proof-of-concept exploit tool has been publicly released for a maximum severity Apache Parquet vulnerability, tracked as CVE-2025-30065, making it easy to find vulnerable servers.

    The tool was released by F5 Labs researchers who investigated the vulnerability after finding that multiple existing PoCs were either weak or completely non-functional.

    The tool serves as proof of CVE-2025-30065’s practical exploitability and can also help administrators evaluate their environments and secure servers.

    Apache Parquet is an open-source, columnar storage format designed for efficient data processing, widely used by big data platforms and organizations engaged in data engineering and analytics.

    The flaw was first disclosed on April 1, 2025, following an earlier discovery by Amazon researcher Keyi Li. It was categorized as a remote code execution impacting all versions of Apache Parquet up to and including 1.15.0.

    From a technical perspective, CVE-2025-30065 is a deserialization flaw in the parquet-avro module of Apache Parquet Java, where the library fails to restrict which Java classes can be instantiated when reading Avro data embedded in Parquet files.

    On April 2, 2025, Endor Labs published a write-up warning about the risk of exploitation and its potential impact on systems that import Parquet files from external points.

    Subsequent analysis by F5 Labs shows that the flaw is not a full deserialization RCE but can still be misused if a class has side effects during instantiation, like when making a network request from the vulnerable system to an attacker-controlled server.

    However, the researchers concluded that practical exploitation is difficult, and CVE-2025-30065 has limited value to attackers.

    “While Parquet and Avro are used widely, this issue requires a specific set of circumstances that isn’t all that likely in general,” reads the F5 Labs report.

    “Even then, this CVE only allows attackers to trigger the instantiation of a Java object which then must have a side effect that is useful for the attacker.”

    Despite the low likelihood of exploitation, the researchers admit that some organizations process Parquet files from external, often unverified sources, and hence the risk is significant in some environments.

    For this reason, F5 Labs created a “canary exploit” tool (available on GitHub) that triggers an HTTP GET request via instantiation of javax.swing.JEditorKit, allowing users to verify exposure.

    Besides using the tool, it is recommended to upgrade to Apache Parquet version 15.1.1 or later, and configure ‘org.apache.parquet.avro.SERIALIZABLE_PACKAGES’ to restrict which packages are allowed for deserialization.


    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.



    Source link

    0 Like this
    Apache critical detect exploit flaw Parquet Servers tool vulnerable
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleAMC Plan Visualizer Tool: Agile Forecasting for Accurate Plans
    Next Article Samsung MagicINFO 9 Web server RCE defect now manipulated in strikes

    Related Posts

    Cyber Security

    Where To Look For The Next Cybersecurity Unicorn

    May 16, 2025
    News

    Spies hack high-value mail servers using an exploit from yesteryear

    May 16, 2025
    Cyber Security

    US charges 12 more suspects linked to $230 million crypto theft

    May 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.