Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f74j-gffq-vm9p | pyquokka is Vulnerable to Remote Code Execution by Pickle Deserialization via FlightServer |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Marsupialtail
Marsupialtail quokka |
|
| Vendors & Products |
Marsupialtail
Marsupialtail quokka |
Fri, 17 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Oct 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data. | |
| Title | Remote Code Execution by Pickle Deserialization via FlightServer in pyquokka | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-17T20:56:21.532Z
Reserved: 2025-10-15T15:03:28.134Z
Link: CVE-2025-62515
Updated: 2025-10-17T20:56:17.729Z
Status : Awaiting Analysis
Published: 2025-10-17T21:15:36.783
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-62515
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:21:53Z
Github GHSA