CRITICAL · 9.2

CVE-2022-46179

LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anyth...

Vulnerability Description

LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to "" (no quotes) to null the variable and force credential checks.

CVSS Score

9.2

CRITICAL

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Liuos ProjectLiuos0.1.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-46179?

CVE-2022-46179 is a vulnerability with a CVSS score of 9.2 (CRITICAL). LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anyth...

How severe is CVE-2022-46179?

CVE-2022-46179 has been rated CRITICAL with a CVSS base score of 9.2/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2022-46179?

Check the references section above for vendor advisories and patch information. Affected products include: Liuos Project Liuos.