Search criteria
5 vulnerabilities found for looker by google
CVE-2024-8912 (GCVE-0-2024-8912)
Vulnerability from cvelistv5 – Published: 2024-10-11 18:22 – Updated: 2024-10-11 18:32
VLAI?
Title
HTTP Request Smuggling in Looker
Summary
An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.
There are two Looker versions that are hosted by Looker:
* Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.
* Looker (original) was not vulnerable to this issue.
Customer-hosted Looker instances were found to be vulnerable and must be upgraded.
This vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .
For Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:
* 23.12 -> 23.12.123+
* 23.18 -> 23.18.117+
* 24.0 -> 24.0.92+
* 24.6 -> 24.6.77+
* 24.8 -> 24.8.66+
* 24.10 -> 24.10.78+
* 24.12 -> 24.12.56+
* 24.14 -> 24.14.37+
Severity ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Looker |
Affected:
23.12.0 , < 23.12.123
(custom)
Affected: 23.18.0 , < 23.18.117 (custom) Affected: 24.0.0 , < 24.0.92 (custom) Affected: 24.6.0 , < 24.6.77 (custom) Affected: 24.8.0 , < 24.8.66 (custom) Affected: 24.10.0 , < 24.10.78 (custom) Affected: 24.12.0 , < 24.12.56 (custom) Affected: 24.14.0 , < 24.14.37 (custom) |
|||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8912",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-11T18:32:06.265105Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T18:32:20.493Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Customer-hosted instances"
],
"product": "Looker",
"vendor": "Google",
"versions": [
{
"lessThan": "23.12.123",
"status": "affected",
"version": "23.12.0",
"versionType": "custom"
},
{
"lessThan": "23.18.117",
"status": "affected",
"version": "23.18.0",
"versionType": "custom"
},
{
"lessThan": "24.0.92",
"status": "affected",
"version": "24.0.0",
"versionType": "custom"
},
{
"lessThan": "24.6.77",
"status": "affected",
"version": "24.6.0",
"versionType": "custom"
},
{
"lessThan": "24.8.66",
"status": "affected",
"version": "24.8.0",
"versionType": "custom"
},
{
"lessThan": "24.10.78",
"status": "affected",
"version": "24.10.0",
"versionType": "custom"
},
{
"lessThan": "24.12.56",
"status": "affected",
"version": "24.12.0",
"versionType": "custom"
},
{
"lessThan": "24.14.37",
"status": "affected",
"version": "24.14.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Google Cloud core instances"
],
"product": "Looker",
"vendor": "Google",
"versions": [
{
"lessThanOrEqual": "24.14",
"status": "affected",
"version": "23.6",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\u003c/p\u003e\u003cp\u003eThere are two Looker versions that are hosted by Looker:\u003c/p\u003e\u003cul\u003e\u003cli\u003eLooker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\u003c/li\u003e\u003cli\u003eLooker (original) was not vulnerable to this issue.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\u003cbr\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgba(255, 255, 255, 0.95);\"\u003eThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://download.looker.com/\"\u003eLooker download page\u003c/a\u003e\u003cspan style=\"background-color: rgba(255, 255, 255, 0.95);\"\u003e.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003eFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\u003c/p\u003e\u003cul\u003e\u003cli\u003e23.12 -\u0026gt; 23.12.123+\u003c/li\u003e\u003cli\u003e23.18 -\u0026gt; 23.18.117+\u003c/li\u003e\u003cli\u003e24.0 -\u0026gt; 24.0.92+\u003c/li\u003e\u003cli\u003e24.6 -\u0026gt; 24.6.77+\u003c/li\u003e\u003cli\u003e24.8 -\u0026gt; 24.8.66+\u003c/li\u003e\u003cli\u003e24.10 -\u0026gt; 24.10.78+\u003c/li\u003e\u003cli\u003e24.12 -\u0026gt; 24.12.56+\u003c/li\u003e\u003cli\u003e24.14 -\u0026gt; 24.14.37+\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\n\nThere are two Looker versions that are hosted by Looker:\n\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\n * Looker (original) was not vulnerable to this issue.\n\n\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\n\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\n\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\n\n * 23.12 -\u003e 23.12.123+\n * 23.18 -\u003e 23.18.117+\n * 24.0 -\u003e 24.0.92+\n * 24.6 -\u003e 24.6.77+\n * 24.8 -\u003e 24.8.66+\n * 24.10 -\u003e 24.10.78+\n * 24.12 -\u003e 24.12.56+\n * 24.14 -\u003e 24.14.37+"
}
],
"impacts": [
{
"capecId": "CAPEC-33",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-33 HTTP Request Smuggling"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T18:22:50.565Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HTTP Request Smuggling in Looker",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2024-8912",
"datePublished": "2024-10-11T18:22:50.565Z",
"dateReserved": "2024-09-16T21:00:02.515Z",
"dateUpdated": "2024-10-11T18:32:20.493Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-5166 (GCVE-0-2024-5166)
Vulnerability from cvelistv5 – Published: 2024-05-22 16:11 – Updated: 2024-08-01 21:03
VLAI?
Title
Insecure Direct Object Reference In Looker
Summary
An Insecure Direct Object Reference in Google Cloud's Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model.
Severity ?
6.5 (Medium)
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Google Cloud | Looker |
Affected:
23.18
Affected: 23.20 Affected: 24.0 Affected: 24.2 Affected: 24.4 Affected: 24.6 Affected: 24.8 Affected: 24.10 Affected: 24.12 Affected: 24.14 Affected: 24.16 Affected: 24.18 Affected: 24.20 |
Credits
Ionut Cernica with the UiPath Security Team
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-5166",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-22T19:50:49.820213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T18:01:48.810Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:03:10.986Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Looker",
"vendor": "Google Cloud",
"versions": [
{
"status": "affected",
"version": "23.18"
},
{
"status": "affected",
"version": "23.20"
},
{
"status": "affected",
"version": "24.0"
},
{
"status": "affected",
"version": "24.2"
},
{
"status": "affected",
"version": "24.4"
},
{
"status": "affected",
"version": "24.6"
},
{
"status": "affected",
"version": "24.8"
},
{
"status": "affected",
"version": "24.10"
},
{
"status": "affected",
"version": "24.12"
},
{
"status": "affected",
"version": "24.14"
},
{
"status": "affected",
"version": "24.16"
},
{
"status": "affected",
"version": "24.18"
},
{
"status": "affected",
"version": "24.20"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Ionut Cernica with the UiPath Security Team"
}
],
"datePublic": "2024-02-15T08:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: var(--wht);\"\u003eAn Insecure Direct Object Reference in Google Cloud\u0027s Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "An Insecure Direct Object Reference in Google Cloud\u0027s Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-639",
"description": "CWE-639 Authorization Bypass Through User-Controlled Key",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-30T07:39:35.917Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Insecure Direct Object Reference In Looker",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2024-5166",
"datePublished": "2024-05-22T16:11:55.740Z",
"dateReserved": "2024-05-21T09:50:35.869Z",
"dateUpdated": "2024-08-01T21:03:10.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-8912 (GCVE-0-2024-8912)
Vulnerability from nvd – Published: 2024-10-11 18:22 – Updated: 2024-10-11 18:32
VLAI?
Title
HTTP Request Smuggling in Looker
Summary
An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.
There are two Looker versions that are hosted by Looker:
* Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.
* Looker (original) was not vulnerable to this issue.
Customer-hosted Looker instances were found to be vulnerable and must be upgraded.
This vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .
For Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:
* 23.12 -> 23.12.123+
* 23.18 -> 23.18.117+
* 24.0 -> 24.0.92+
* 24.6 -> 24.6.77+
* 24.8 -> 24.8.66+
* 24.10 -> 24.10.78+
* 24.12 -> 24.12.56+
* 24.14 -> 24.14.37+
Severity ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Looker |
Affected:
23.12.0 , < 23.12.123
(custom)
Affected: 23.18.0 , < 23.18.117 (custom) Affected: 24.0.0 , < 24.0.92 (custom) Affected: 24.6.0 , < 24.6.77 (custom) Affected: 24.8.0 , < 24.8.66 (custom) Affected: 24.10.0 , < 24.10.78 (custom) Affected: 24.12.0 , < 24.12.56 (custom) Affected: 24.14.0 , < 24.14.37 (custom) |
|||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8912",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-11T18:32:06.265105Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T18:32:20.493Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Customer-hosted instances"
],
"product": "Looker",
"vendor": "Google",
"versions": [
{
"lessThan": "23.12.123",
"status": "affected",
"version": "23.12.0",
"versionType": "custom"
},
{
"lessThan": "23.18.117",
"status": "affected",
"version": "23.18.0",
"versionType": "custom"
},
{
"lessThan": "24.0.92",
"status": "affected",
"version": "24.0.0",
"versionType": "custom"
},
{
"lessThan": "24.6.77",
"status": "affected",
"version": "24.6.0",
"versionType": "custom"
},
{
"lessThan": "24.8.66",
"status": "affected",
"version": "24.8.0",
"versionType": "custom"
},
{
"lessThan": "24.10.78",
"status": "affected",
"version": "24.10.0",
"versionType": "custom"
},
{
"lessThan": "24.12.56",
"status": "affected",
"version": "24.12.0",
"versionType": "custom"
},
{
"lessThan": "24.14.37",
"status": "affected",
"version": "24.14.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Google Cloud core instances"
],
"product": "Looker",
"vendor": "Google",
"versions": [
{
"lessThanOrEqual": "24.14",
"status": "affected",
"version": "23.6",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\u003c/p\u003e\u003cp\u003eThere are two Looker versions that are hosted by Looker:\u003c/p\u003e\u003cul\u003e\u003cli\u003eLooker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\u003c/li\u003e\u003cli\u003eLooker (original) was not vulnerable to this issue.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\u003cbr\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgba(255, 255, 255, 0.95);\"\u003eThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://download.looker.com/\"\u003eLooker download page\u003c/a\u003e\u003cspan style=\"background-color: rgba(255, 255, 255, 0.95);\"\u003e.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003eFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\u003c/p\u003e\u003cul\u003e\u003cli\u003e23.12 -\u0026gt; 23.12.123+\u003c/li\u003e\u003cli\u003e23.18 -\u0026gt; 23.18.117+\u003c/li\u003e\u003cli\u003e24.0 -\u0026gt; 24.0.92+\u003c/li\u003e\u003cli\u003e24.6 -\u0026gt; 24.6.77+\u003c/li\u003e\u003cli\u003e24.8 -\u0026gt; 24.8.66+\u003c/li\u003e\u003cli\u003e24.10 -\u0026gt; 24.10.78+\u003c/li\u003e\u003cli\u003e24.12 -\u0026gt; 24.12.56+\u003c/li\u003e\u003cli\u003e24.14 -\u0026gt; 24.14.37+\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\n\nThere are two Looker versions that are hosted by Looker:\n\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\n * Looker (original) was not vulnerable to this issue.\n\n\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\n\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\n\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\n\n * 23.12 -\u003e 23.12.123+\n * 23.18 -\u003e 23.18.117+\n * 24.0 -\u003e 24.0.92+\n * 24.6 -\u003e 24.6.77+\n * 24.8 -\u003e 24.8.66+\n * 24.10 -\u003e 24.10.78+\n * 24.12 -\u003e 24.12.56+\n * 24.14 -\u003e 24.14.37+"
}
],
"impacts": [
{
"capecId": "CAPEC-33",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-33 HTTP Request Smuggling"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T18:22:50.565Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HTTP Request Smuggling in Looker",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2024-8912",
"datePublished": "2024-10-11T18:22:50.565Z",
"dateReserved": "2024-09-16T21:00:02.515Z",
"dateUpdated": "2024-10-11T18:32:20.493Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-5166 (GCVE-0-2024-5166)
Vulnerability from nvd – Published: 2024-05-22 16:11 – Updated: 2024-08-01 21:03
VLAI?
Title
Insecure Direct Object Reference In Looker
Summary
An Insecure Direct Object Reference in Google Cloud's Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model.
Severity ?
6.5 (Medium)
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Google Cloud | Looker |
Affected:
23.18
Affected: 23.20 Affected: 24.0 Affected: 24.2 Affected: 24.4 Affected: 24.6 Affected: 24.8 Affected: 24.10 Affected: 24.12 Affected: 24.14 Affected: 24.16 Affected: 24.18 Affected: 24.20 |
Credits
Ionut Cernica with the UiPath Security Team
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-5166",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-22T19:50:49.820213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T18:01:48.810Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:03:10.986Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Looker",
"vendor": "Google Cloud",
"versions": [
{
"status": "affected",
"version": "23.18"
},
{
"status": "affected",
"version": "23.20"
},
{
"status": "affected",
"version": "24.0"
},
{
"status": "affected",
"version": "24.2"
},
{
"status": "affected",
"version": "24.4"
},
{
"status": "affected",
"version": "24.6"
},
{
"status": "affected",
"version": "24.8"
},
{
"status": "affected",
"version": "24.10"
},
{
"status": "affected",
"version": "24.12"
},
{
"status": "affected",
"version": "24.14"
},
{
"status": "affected",
"version": "24.16"
},
{
"status": "affected",
"version": "24.18"
},
{
"status": "affected",
"version": "24.20"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Ionut Cernica with the UiPath Security Team"
}
],
"datePublic": "2024-02-15T08:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: var(--wht);\"\u003eAn Insecure Direct Object Reference in Google Cloud\u0027s Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "An Insecure Direct Object Reference in Google Cloud\u0027s Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model."
}
],
"impacts": [
{
"capecId": "CAPEC-180",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-639",
"description": "CWE-639 Authorization Bypass Through User-Controlled Key",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-30T07:39:35.917Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Insecure Direct Object Reference In Looker",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2024-5166",
"datePublished": "2024-05-22T16:11:55.740Z",
"dateReserved": "2024-05-21T09:50:35.869Z",
"dateUpdated": "2024-08-01T21:03:10.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2024-5166
Vulnerability from fkie_nvd - Published: 2024-05-22 17:16 - Updated: 2025-07-22 20:49
Severity ?
Summary
An Insecure Direct Object Reference in Google Cloud's Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:looker:23.18:*:*:*:*:*:*:*",
"matchCriteriaId": "35DADF6C-5886-4581-99BF-45B69799A2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:23.20:*:*:*:*:*:*:*",
"matchCriteriaId": "7503C5F0-9117-4FA7-9E40-EA1330DD36DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "748F483C-28A7-4D23-AC1B-504599DF4115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0669F449-7F7A-47C5-B92B-645B0899D25C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98E862C4-3B4C-43B2-84BB-98AC9BD6F671",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.6:*:*:*:*:*:*:*",
"matchCriteriaId": "976DB9CD-0A33-4072-B314-0BFE3F4D9A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4428B311-99F8-4D48-9631-E9383B4468B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3413C68-2A24-405D-B594-B1575C0B0CE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.12:*:*:*:*:*:*:*",
"matchCriteriaId": "81907A42-E3EB-41AD-ADDC-1208BED1DE91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.14:*:*:*:*:*:*:*",
"matchCriteriaId": "01E5496C-F3CF-424B-9503-3ABC66CC2AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EB2EFA-B666-4FD2-8439-343419388E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.18:*:*:*:*:*:*:*",
"matchCriteriaId": "03EA95CD-99BC-45A5-A2B2-A5A713EE8634",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:looker:24.20:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE5626A-D8DD-49F7-9361-31EE071BCDF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference in Google Cloud\u0027s Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model."
},
{
"lang": "es",
"value": "Una referencia de objeto directa insegura en Looker de Google Cloud permiti\u00f3 la exposici\u00f3n de metadatos entre usuarios autenticados de Looker que compart\u00edan el mismo modelo LookML."
}
],
"id": "CVE-2024-5166",
"lastModified": "2025-07-22T20:49:16.807",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "cve-coordination@google.com",
"type": "Secondary"
}
]
},
"published": "2024-05-22T17:16:15.957",
"references": [
{
"source": "cve-coordination@google.com",
"tags": [
"Product"
],
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions"
}
],
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-639"
}
],
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-639"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}