CVE-2023-47248 Scanner
CVE-2023-47248 Scanner - Remote Code Execution (RCE) vulnerability in PyArrow
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
25 days
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
PyArrow is a cross-language development platform for in-memory data aimed at developing data analytics systems and applications. It is extensively used in data engineering and data science for fast data interchange, allowing tools like Apache Spark, Pandas, and others to share data across languages efficiently. Organizations that need high-performance analytic operations often rely on PyArrow for its optimized serialization formats. It is popular for handling large datasets due to its efficient use of memory and seamless integration with other Apache projects. Users and developers value its ability to unite the Python ecosystem with other data frameworks through Arrow Flight RPC.
The Remote Code Execution (RCE) vulnerability in PyArrow Flight RPC allows attackers to execute arbitrary code. This flaw could allow remote attackers to exploit the system using a specially crafted Python-defined extension type. The vulnerability is significant due to its capacity to execute malicious code remotely, hence the critical CVSS score of 9.8. Attackers exploiting this issue could take unauthorized control of the systems, manipulate data, and introduce further exploits in the connected analytics environment. This type of vulnerability often demands immediate attention due to the severe potential impact on system operations and data integrity.
Vulnerability details reveal that the flaw exists in PyArrow's handling of Python-defined extension types in the Flight RPC from versions v0.14.0 through v14.0.0. The issue arises when improperly crafted data is sent to the Flight service, exploiting its serialization process to execute commands. The vulnerable endpoint '/arrow.flight.protocol.FlightService/DoPut' becomes the point of exploitation for attackers to send such requests. Ineffectively validating input and deserializing without adequate checks is at the core of the vulnerability, allowing remote code execution.
If exploited, this vulnerability permits attackers to gain substantial control over the affected system. The attackers could execute arbitrary commands, causing the system to behave unpredictably, manipulate sensitive data, or initiate additional malicious activities. This breach could lead to unauthorized data access, disruption of data services, and potential data loss, posing a serious threat to any data-processing system leveraging PyArrow.
REFERENCES