Bug 2448632 (CVE-2026-32609) - CVE-2026-32609 nicolargo.github.io/glances: Glances has Incomplete Secrets Redaction: /api/v4/args Endpoint Leaks Password Hash and SNMP Credentials
Summary: CVE-2026-32609 nicolargo.github.io/glances: Glances has Incomplete Secrets Re...
Keywords:
Status: NEW
Alias: CVE-2026-32609
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2448633 2448635 2448636 2448637 2448638
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-18 15:02 UTC by OSIDB Bzimport
Modified: 2026-03-18 15:31 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-18 15:02:22 UTC
Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, the `/api/v4/args` and `/api/v4/args/{item}` endpoints were not addressed by this fix. These endpoints return the complete command-line arguments namespace via `vars(self.args)`, which includes the password hash (salt + pbkdf2_hmac), SNMP community strings, SNMP authentication keys, and the configuration file path. When Glances runs without `--password` (the default), these endpoints are accessible without any authentication. Version 4.5.2 provides a more complete fix.


Note You need to log in before you can comment on or make changes to this bug.