qiskit-ibm-runtime@0.11.0 vulnerabilities

IBM Quantum client for Qiskit Runtime.

Direct Vulnerabilities

Known vulnerabilities in the qiskit-ibm-runtime package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Uncontrolled Recalculation of Data to Code ('Code Injection')

qiskit-ibm-runtime is an IBM Quantum client for Qiskit Runtime.

Affected versions of this package are vulnerable to Uncontrolled Recalculation of Data to Code ('Code Injection') due to the usage of eval method in Options._get_program_inputs. An attacker can execute arbitrary code by using a specifically crafted object that, when processed by the eval method, leads to code execution. This issue arises because Options are used server-side, potentially exposing runtime containers to arbitrary code injection.

How to fix Uncontrolled Recalculation of Data to Code ('Code Injection')?

Upgrade qiskit-ibm-runtime to version 0.11.1 or higher.

[0.11.0,0.11.1)
  • M
Deserialization of Untrusted Data

qiskit-ibm-runtime is an IBM Quantum client for Qiskit Runtime.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the deserialization of JSON data using a specifically crafted input string. An attacker can execute arbitrary code on the system by providing a maliciously formatted input string to the deserialization process.

How to fix Deserialization of Untrusted Data?

Upgrade qiskit-ibm-runtime to version 0.21.2 or higher.

[0.1.0,0.21.2)