Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-32611

Опубликовано: 18 мар. 2026
Источник: debian
EPSS Низкий

Описание

Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glancesfixed4.5.2+dfsg-1package

Примечания

  • https://github.com/nicolargo/glances/security/advisories/GHSA-49g7-2ww7-3vf5

  • Fixed by: https://github.com/nicolargo/glances/commit/f3e94930e3d8a2ddf14d725701a1f47d0e6936e3 (v4.5.2)

EPSS

Процентиль: 2%
0.00014
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
11 дней назад

Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.

CVSS3: 7
nvd
11 дней назад

Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix.

CVSS3: 7
github
13 дней назад

Glances has a SQL Injection in DuckDB Export via Unparameterized DDL Statements

EPSS

Процентиль: 2%
0.00014
Низкий