Описание
Qiskit allows arbitrary code execution decoding QPY format versions < 13
Impact
A maliciously crafted QPY file can potentially execute arbitrary-code embedded in the payload without privilege escalation when deserializing QPY formats < 13. A python process calling Qiskit's qiskit.qpy.load() function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of a specially constructed payload.
Patches
Fixed in Qiskit 1.4.2 and in Qiskit 2.0.0rc2
Пакеты
qiskit-terra
>= 0.18.0, <= 0.46.3
Отсутствует
qiskit
<= 1.4.1
1.4.2
qiskit
= 2.0.0rc1
2.0.0rc2
Связанные уязвимости
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.