CVE-2022-46179

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-46179
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-46179.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-46179
Aliases
  • GHSA-f9x3-mj2r-cqmf
Published
2022-12-28T07:00:37.036Z
Modified
2025-12-04T10:39:51.953219Z
Severity
  • 9.2 (Critical) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H CVSS Calculator
Summary
LiuOS vulnerable to Authorization Bypass through User-Controlled Key
Details

LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUBACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUBACTIONS environment variable and set it to "" (no quotes) to null the variable and force credential checks.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/46xxx/CVE-2022-46179.json",
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Git / github.com/liuwoodscode/liuos

Affected ranges

Type
GIT
Repo
https://github.com/liuwoodscode/liuos
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed