Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-30930

Опубликовано: 10 мар. 2026
Источник: debian
EPSS Низкий

Описание

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, The TimescaleDB export module constructs SQL queries using string concatenation with unsanitized system monitoring data. The normalize() method wraps string values in single quotes but does not escape embedded single quotes, making SQL injection trivial via attacker-controlled data such as process names, filesystem mount points, network interface names, or container names. This vulnerability is fixed in 4.5.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glancesfixed4.5.1+dfsg-1package
glancesnot-affectedtrixiepackage
glancesnot-affectedbookwormpackage
glancesnot-affectedbullseyepackage

Примечания

  • https://github.com/nicolargo/glances/security/advisories/GHSA-x46r-mf5g-xpr6

  • Introduced with: https://github.com/nicolargo/glances/commit/1365d600a3c92483efa42ad67aad8b9aa2769635 (v4.3.2)

  • Fixed by: https://github.com/nicolargo/glances/commit/39161f0d6fd723d83f534b48f24cdca722573336 (v4.5.1)

EPSS

Процентиль: 7%
0.00026
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
19 дней назад

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, The TimescaleDB export module constructs SQL queries using string concatenation with unsanitized system monitoring data. The normalize() method wraps string values in single quotes but does not escape embedded single quotes, making SQL injection trivial via attacker-controlled data such as process names, filesystem mount points, network interface names, or container names. This vulnerability is fixed in 4.5.1.

CVSS3: 9.8
nvd
19 дней назад

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, The TimescaleDB export module constructs SQL queries using string concatenation with unsanitized system monitoring data. The normalize() method wraps string values in single quotes but does not escape embedded single quotes, making SQL injection trivial via attacker-controlled data such as process names, filesystem mount points, network interface names, or container names. This vulnerability is fixed in 4.5.1.

github
20 дней назад

Glances has SQL Injection via Process Names in TimescaleDB Export

EPSS

Процентиль: 7%
0.00026
Низкий