CVE-2026-30928 Scanner
CVE-2026-30928 Scanner - Information Disclosure vulnerability in Glances
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
23 days 19 hours
Scan only one
URL
Toolbox
Glances is a cross-platform monitoring tool frequently used by system administrators to provide a detailed overview of their systems. It supports multiple operating systems including Linux, MacOS, and Windows, making it a versatile choice for monitoring diverse environments. The tool is often integrated into various infrastructures to track system performance and health. With capabilities to monitor CPU usage, memory consumption, and network bandwidth, Glances is extensively used for keeping an eye on system efficiency. In corporate settings, it aids in resource management and ensuring that IT assets are performing within optimal parameters. Glances is typically used in server environments where resource monitoring is crucial for maintaining application uptime and performance.
The Information Disclosure vulnerability in Glances arises when sensitive configuration data is inadvertently exposed via the /api/4/config REST API endpoint. This flaw exists in versions prior to 4.5.1, allowing unauthorized access to sensitive information. Attackers can potentially exploit this vulnerability to gain access to credentials, such as passwords and keys, posing a significant security risk. The exposure is due to inadequate filtering of sensitive data in API responses. Unauthorized disclosure of such information can lead to further compromise of the system. This vulnerability underscores the importance of secure API implementation and access controls in software applications.
The vulnerability is technically evidenced by unmitigated access to the /api/4/config REST API endpoint in Glances, prior to version 4.5.1. This endpoint can leak sensitive configuration details including passwords, making it a critical point of exploitation. Attackers do not require authentication to exploit this issue, hence they can access sensitive data merely by sending HTTP GET requests to the vulnerable endpoint. The vulnerability exists as a result of improperly handled configuration data within the application's API. This technical flaw can be detected by analyzing API responses and examining for patterns indicating the presence of credentials. Such improperly contained disclosures expose the system to unauthorized access.
The potential effects of exploiting the Glances Information Disclosure vulnerability include full system compromise, credential theft, and unauthorized access to sensitive data. Exploiting this flaw can allow an attacker to obtain passwords and keys which can be used to infiltrate other parts of the IT infrastructure. This could lead to a wider breach, including unauthorized access to data, network disruptions, and compromised system integrity. A successful exploit can lead to loss of confidentiality and poses a legal risk related to data protection standards. Organizations failing to address this issue could face reputational damage, financial losses, and increased scrutiny from regulatory bodies.
REFERENCES