| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-grp3-h8m8-45p7 | Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nicolargo:glances:*:*:*:*:*:*:*:* |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nicolargo
Nicolargo glances |
|
| Vendors & Products |
Nicolargo
Nicolargo glances |
Mon, 20 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Cassandra export module (`glances/exports/glances_cassandra/__init__.py`) interpolates `keyspace`, `table`, and `replication_factor` configuration values directly into CQL statements without validation. A user with write access to `glances.conf` can redirect all monitoring data to an attacker-controlled Cassandra keyspace. Version 4.5.4 contains a fix. | |
| Title | Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T13:35:04.526Z
Reserved: 2026-04-03T20:09:02.828Z
Link: CVE-2026-35588
Updated: 2026-04-21T13:34:55.661Z
Status : Analyzed
Published: 2026-04-21T00:16:29.163
Modified: 2026-04-22T18:40:39.270
Link: CVE-2026-35588
No data.
OpenCVE Enrichment
Updated: 2026-04-21T15:37:55Z
Github GHSA