NIXPKGS-2026-1197
GitHub issue
published on
Permalink
CVE-2026-35588
6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
5 packages
- python312Packages.glances-api
- python313Packages.glances-api
- python314Packages.glances-api
- home-assistant-component-tests.glances
- tests.home-assistant-components.glances
- @LeSuisse accepted
- @LeSuisse published on GitHub
Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Cassandra export module (`glances/exports/glances_cassandra/__init__.py`) interpolates `keyspace`, `table`, and `replication_factor` configuration values directly into CQL statements without validation. A user with write access to `glances.conf` can redirect all monitoring data to an attacker-controlled Cassandra keyspace. Version 4.5.4 contains a fix.
References
-
https://github.com/nicolargo/glances/security/advisories/GHSA-grp3-h8m8-45p7 x_refsource_CONFIRM
Affected products
glances
- ==< 4.5.4
Matching in nixpkgs
Ignored packages (5)
pkgs.python312Packages.glances-api
Python API for interacting with Glances
pkgs.python313Packages.glances-api
Python API for interacting with Glances
pkgs.python314Packages.glances-api
Python API for interacting with Glances
pkgs.home-assistant-component-tests.glances
Open source home automation that puts local control and privacy first
pkgs.tests.home-assistant-components.glances
Open source home automation that puts local control and privacy first
Package maintainers
-
@k0ral Koral <koral@mailoo.org>
-
@MiniHarinn Harinn <prinn.dev@pm.me>