Bug 2459942 (CVE-2026-35587) - CVE-2026-35587 glances: Glances: Server-Side Request Forgery allows unauthorized access and credential leakage via public_api parameter
Summary: CVE-2026-35587 glances: Glances: Server-Side Request Forgery allows unauthori...
Keywords:
Status: NEW
Alias: CVE-2026-35587
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2460034 2460037
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-21 00:02 UTC by OSIDB Bzimport
Modified: 2026-04-21 10:08 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-21 00:02:29 UTC
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, a Server-Side Request Forgery (SSRF) vulnerability exists in the Glances IP plugin due to improper validation of the public_api configuration parameter. The value of public_api is used directly in outbound HTTP requests without any scheme restriction or hostname/IP validation. An attacker who can modify the Glances configuration can force the application to send requests to arbitrary internal or external endpoints. Additionally, when public_username and public_password are set, Glances automatically includes these credentials in the Authorization: Basic header, resulting in credential leakage to attacker-controlled servers. This vulnerability can be exploited to access internal network services, retrieve sensitive data from cloud metadata endpoints, and/or exfiltrate credentials via outbound HTTP requests. The issue arises because public_api is passed directly to the HTTP client (urlopen_auth) without validation, allowing unrestricted outbound connections and unintended disclosure of sensitive information. Version 4.5.4 contains a patch.


Note You need to log in before you can comment on or make changes to this bug.