Описание
Glances exposes the REST API without authentication
Summary
Glances web server runs without authentication by default when started with glances -w, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client.
Details
Root Cause: Authentication is optional and disabled by default. When no password is provided, the API router initializes without authentication dependency, and the server binds to 0.0.0.0 exposing all endpoints.
Affected Code:
- File:
glances/outputs/glances_restful_api.py, lines 259-272
- File:
glances/outputs/glances_restful_api.py, lines 477-480
- File:
glances/outputs/glances_restful_api.py, lines 98-99
- File:
glances/plugins/processlist/__init__.py, lines 127-140
PoC
- Start Glances in default web server mode:
- Access API without authentication from any network client:
- Extract system information:
- Harvest credentials from process list:
- Example credential exposure:
Impact
Complete system reconnaissance and credential harvesting from any network client. Exposed endpoints include system info, process lists with full command-line arguments (containing passwords/API keys/tokens), network connections, filesystems, and Docker containers. Enables lateral movement and targeted attacks using stolen credentials.
Пакеты
Glances
< 4.5.2
4.5.2
Связанные уязвимости
(Glances is an open-source system cross-platform monitoring tool. Prior ...)
Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.
Glances is an open-source system cross-platform monitoring tool. Prior ...