Impact
The Glances IP plugin contains an SSRF flaw (CWE-918). The public_api parameter is used as‑is in outbound HTTP requests, without scheme or hostname validation. An attacker who can modify the Glances configuration can force the application to send requests to arbitrary internal or external endpoints. If public_username and public_password are set, these credentials are automatically included in the Authorization: Basic header, thereby leaking them to the target endpoint. This flaw allows an attacker to access internal network services, retrieve sensitive data from cloud metadata endpoints, and/or exfiltrate credentials via outbound HTTP.
Affected Systems
The vulnerability affects the open‑source system monitoring tool Glances provided by nicolargo. Versions prior to 4.5.4 are vulnerable; the fix is available in version 4.5.4 and later.
Risk and Exploitability
The CVSS score of 7.3 indicates high severity. The EPSS score is less than 1%, and the vulnerability is not listed in the CISA KEV catalog. Exploitability requires the attacker to have the ability to modify Glances configuration or otherwise inject custom values for the public_api parameter. From the description, the likely attack vector is local configuration tampering or a privileged interface that can alter the config. Once the flaw is triggered, the application can reach any endpoint accessible from the host, including internal services, cloud metadata servers, or attacker‑controlled servers, potentially leaking authentication credentials. The high CVSS score combined with unrestricted outbound connectivity highlights significant risk if not patched promptly.
OpenCVE Enrichment
Github GHSA