DNS Rebinding Vulnerability in Glances Monitoring Tool by Nicolargo
CVE-2026-32632
5.9MEDIUM
What is CVE-2026-32632?
Glances, a versatile open-source cross-platform monitoring tool, has a vulnerability that allows attackers to exploit DNS rebinding. Before version 4.5.2, its REST API and WebUI accept arbitrary 'Host' headers without applying necessary security measures like 'TrustedHostMiddleware.' Consequently, attacker-controlled domains can gain access to these endpoints through DNS rebinding attacks, bypassing the same-origin policy protections. This security flaw highlights the importance of proper host allowlisting to safeguard against unauthorized access within network environments.
Affected Version(s)
glances < 4.5.2
