CVE-2024-8912 (GCVE-0-2024-8912)
Vulnerability from cvelistv5 – Published: 2024-10-11 18:22 – Updated: 2024-10-11 18:32
VLAI?
Title
HTTP Request Smuggling in Looker
Summary
An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.
There are two Looker versions that are hosted by Looker:
* Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.
* Looker (original) was not vulnerable to this issue.
Customer-hosted Looker instances were found to be vulnerable and must be upgraded.
This vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .
For Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:
* 23.12 -> 23.12.123+
* 23.18 -> 23.18.117+
* 24.0 -> 24.0.92+
* 24.6 -> 24.6.77+
* 24.8 -> 24.8.66+
* 24.10 -> 24.10.78+
* 24.12 -> 24.12.56+
* 24.14 -> 24.14.37+
Severity ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Looker |
Affected:
23.12.0 , < 23.12.123
(custom)
Affected: 23.18.0 , < 23.18.117 (custom) Affected: 24.0.0 , < 24.0.92 (custom) Affected: 24.6.0 , < 24.6.77 (custom) Affected: 24.8.0 , < 24.8.66 (custom) Affected: 24.10.0 , < 24.10.78 (custom) Affected: 24.12.0 , < 24.12.56 (custom) Affected: 24.14.0 , < 24.14.37 (custom) |
|||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8912",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-11T18:32:06.265105Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T18:32:20.493Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Customer-hosted instances"
],
"product": "Looker",
"vendor": "Google",
"versions": [
{
"lessThan": "23.12.123",
"status": "affected",
"version": "23.12.0",
"versionType": "custom"
},
{
"lessThan": "23.18.117",
"status": "affected",
"version": "23.18.0",
"versionType": "custom"
},
{
"lessThan": "24.0.92",
"status": "affected",
"version": "24.0.0",
"versionType": "custom"
},
{
"lessThan": "24.6.77",
"status": "affected",
"version": "24.6.0",
"versionType": "custom"
},
{
"lessThan": "24.8.66",
"status": "affected",
"version": "24.8.0",
"versionType": "custom"
},
{
"lessThan": "24.10.78",
"status": "affected",
"version": "24.10.0",
"versionType": "custom"
},
{
"lessThan": "24.12.56",
"status": "affected",
"version": "24.12.0",
"versionType": "custom"
},
{
"lessThan": "24.14.37",
"status": "affected",
"version": "24.14.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Google Cloud core instances"
],
"product": "Looker",
"vendor": "Google",
"versions": [
{
"lessThanOrEqual": "24.14",
"status": "affected",
"version": "23.6",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\u003c/p\u003e\u003cp\u003eThere are two Looker versions that are hosted by Looker:\u003c/p\u003e\u003cul\u003e\u003cli\u003eLooker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\u003c/li\u003e\u003cli\u003eLooker (original) was not vulnerable to this issue.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\u003cbr\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgba(255, 255, 255, 0.95);\"\u003eThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://download.looker.com/\"\u003eLooker download page\u003c/a\u003e\u003cspan style=\"background-color: rgba(255, 255, 255, 0.95);\"\u003e.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003eFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\u003c/p\u003e\u003cul\u003e\u003cli\u003e23.12 -\u0026gt; 23.12.123+\u003c/li\u003e\u003cli\u003e23.18 -\u0026gt; 23.18.117+\u003c/li\u003e\u003cli\u003e24.0 -\u0026gt; 24.0.92+\u003c/li\u003e\u003cli\u003e24.6 -\u0026gt; 24.6.77+\u003c/li\u003e\u003cli\u003e24.8 -\u0026gt; 24.8.66+\u003c/li\u003e\u003cli\u003e24.10 -\u0026gt; 24.10.78+\u003c/li\u003e\u003cli\u003e24.12 -\u0026gt; 24.12.56+\u003c/li\u003e\u003cli\u003e24.14 -\u0026gt; 24.14.37+\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\n\nThere are two Looker versions that are hosted by Looker:\n\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\n * Looker (original) was not vulnerable to this issue.\n\n\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\n\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\n\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\n\n * 23.12 -\u003e 23.12.123+\n * 23.18 -\u003e 23.18.117+\n * 24.0 -\u003e 24.0.92+\n * 24.6 -\u003e 24.6.77+\n * 24.8 -\u003e 24.8.66+\n * 24.10 -\u003e 24.10.78+\n * 24.12 -\u003e 24.12.56+\n * 24.14 -\u003e 24.14.37+"
}
],
"impacts": [
{
"capecId": "CAPEC-33",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-33 HTTP Request Smuggling"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-11T18:22:50.565Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HTTP Request Smuggling in Looker",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2024-8912",
"datePublished": "2024-10-11T18:22:50.565Z",
"dateReserved": "2024-09-16T21:00:02.515Z",
"dateUpdated": "2024-10-11T18:32:20.493Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\\n\\nThere are two Looker versions that are hosted by Looker:\\n\\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\\n * Looker (original) was not vulnerable to this issue.\\n\\n\\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\\n\\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\\n\\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\\n\\n * 23.12 -\u003e 23.12.123+\\n * 23.18 -\u003e 23.18.117+\\n * 24.0 -\u003e 24.0.92+\\n * 24.6 -\u003e 24.6.77+\\n * 24.8 -\u003e 24.8.66+\\n * 24.10 -\u003e 24.10.78+\\n * 24.12 -\u003e 24.12.56+\\n * 24.14 -\u003e 24.14.37+\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de contrabando de solicitudes HTTP en Looker permiti\\u00f3 que un atacante no autorizado capturara respuestas HTTP destinadas a usuarios leg\\u00edtimos. Hay dos versiones de Looker alojadas por Looker: * Se descubri\\u00f3 que Looker (n\\u00facleo de Google Cloud) era vulnerable. Este problema ya se ha mitigado y nuestra investigaci\\u00f3n no ha encontrado signos de explotaci\\u00f3n. * Looker (original) no era vulnerable a este problema. Se descubri\\u00f3 que las instancias de Looker alojadas por el cliente eran vulnerables y deben actualizarse. Esta vulnerabilidad se ha corregido en todas las versiones compatibles de Looker alojadas por el cliente, que est\\u00e1n disponibles en la p\\u00e1gina de descarga de Looker https://download.looker.com/ . Para las instancias de Looker alojadas por el cliente, actualice a la \\u00faltima versi\\u00f3n compatible de Looker lo antes posible. Las versiones a continuaci\\u00f3n se han actualizado para proteger contra esta vulnerabilidad. Puede descargar estas versiones en la p\\u00e1gina de descarga de Looker: * 23.12 -\u0026gt; 23.12.123+ * 23.18 -\u0026gt; 23.18.117+ * 24.0 -\u0026gt; 24.0.92+ * 24.6 -\u0026gt; 24.6.77+ * 24.8 -\u0026gt; 24.8.66+ * 24.10 -\u0026gt; 24.10.78+ * 24.12 -\u0026gt; 24.12.56+ * 24.14 -\u0026gt; 24.14.37+\"}]",
"id": "CVE-2024-8912",
"lastModified": "2024-10-15T12:57:46.880",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 8.9, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"HIGH\", \"vulnerableSystemIntegrity\": \"NONE\", \"vulnerableSystemAvailability\": \"NONE\", \"subsequentSystemConfidentiality\": \"HIGH\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}]}",
"published": "2024-10-11T19:15:11.110",
"references": "[{\"url\": \"https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24\", \"source\": \"cve-coordination@google.com\"}]",
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-444\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-8912\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2024-10-11T19:15:11.110\",\"lastModified\":\"2025-07-30T15:23:41.213\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\\n\\nThere are two Looker versions that are hosted by Looker:\\n\\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\\n * Looker (original) was not vulnerable to this issue.\\n\\n\\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\\n\\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\\n\\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\\n\\n * 23.12 -\u003e 23.12.123+\\n * 23.18 -\u003e 23.18.117+\\n * 24.0 -\u003e 24.0.92+\\n * 24.6 -\u003e 24.6.77+\\n * 24.8 -\u003e 24.8.66+\\n * 24.10 -\u003e 24.10.78+\\n * 24.12 -\u003e 24.12.56+\\n * 24.14 -\u003e 24.14.37+\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de contrabando de solicitudes HTTP en Looker permiti\u00f3 que un atacante no autorizado capturara respuestas HTTP destinadas a usuarios leg\u00edtimos. Hay dos versiones de Looker alojadas por Looker: * Se descubri\u00f3 que Looker (n\u00facleo de Google Cloud) era vulnerable. Este problema ya se ha mitigado y nuestra investigaci\u00f3n no ha encontrado signos de explotaci\u00f3n. * Looker (original) no era vulnerable a este problema. Se descubri\u00f3 que las instancias de Looker alojadas por el cliente eran vulnerables y deben actualizarse. Esta vulnerabilidad se ha corregido en todas las versiones compatibles de Looker alojadas por el cliente, que est\u00e1n disponibles en la p\u00e1gina de descarga de Looker https://download.looker.com/ . Para las instancias de Looker alojadas por el cliente, actualice a la \u00faltima versi\u00f3n compatible de Looker lo antes posible. Las versiones a continuaci\u00f3n se han actualizado para proteger contra esta vulnerabilidad. Puede descargar estas versiones en la p\u00e1gina de descarga de Looker: * 23.12 -\u0026gt; 23.12.123+ * 23.18 -\u0026gt; 23.18.117+ * 24.0 -\u0026gt; 24.0.92+ * 24.6 -\u0026gt; 24.6.77+ * 24.8 -\u0026gt; 24.8.66+ * 24.10 -\u0026gt; 24.10.78+ * 24.12 -\u0026gt; 24.12.56+ * 24.14 -\u0026gt; 24.14.37+\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.9,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"23.12\",\"versionEndExcluding\":\"23.12.123\",\"matchCriteriaId\":\"BC4484C2-20F0-45FE-92D0-03FCDF9EF7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"23.18\",\"versionEndExcluding\":\"23.18.117\",\"matchCriteriaId\":\"F9334915-5D2B-45CB-9286-42307094445A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.0\",\"versionEndExcluding\":\"24.0.92\",\"matchCriteriaId\":\"954CFC0A-7632-4B43-BAC5-78D63E2CE3AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.6\",\"versionEndExcluding\":\"24.6.77\",\"matchCriteriaId\":\"A0FD97D2-8EE5-4BF6-B38F-E187A7972804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.8\",\"versionEndExcluding\":\"24.8.66\",\"matchCriteriaId\":\"E4857875-6656-4711-9BAA-3EF8506F8E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.10\",\"versionEndExcluding\":\"24.10.78\",\"matchCriteriaId\":\"D802F86A-8BB3-4D64-9899-610893BDD0B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.12\",\"versionEndExcluding\":\"24.12.56\",\"matchCriteriaId\":\"331DDAF4-C8B9-44F0-8F55-0FCCFC65A4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"24.14\",\"versionEndExcluding\":\"24.14.37\",\"matchCriteriaId\":\"DA7AAC28-6AD0-4875-AE6C-504A85C5974D\"}]}]}],\"references\":[{\"url\":\"https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"platforms\": [\"Customer-hosted instances\"], \"product\": \"Looker\", \"vendor\": \"Google\", \"versions\": [{\"lessThan\": \"23.12.123\", \"status\": \"affected\", \"version\": \"23.12.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"23.18.117\", \"status\": \"affected\", \"version\": \"23.18.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"24.0.92\", \"status\": \"affected\", \"version\": \"24.0.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"24.6.77\", \"status\": \"affected\", \"version\": \"24.6.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"24.8.66\", \"status\": \"affected\", \"version\": \"24.8.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"24.10.78\", \"status\": \"affected\", \"version\": \"24.10.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"24.12.56\", \"status\": \"affected\", \"version\": \"24.12.0\", \"versionType\": \"custom\"}, {\"lessThan\": \"24.14.37\", \"status\": \"affected\", \"version\": \"24.14.0\", \"versionType\": \"custom\"}]}, {\"defaultStatus\": \"unaffected\", \"platforms\": [\"Google Cloud core instances\"], \"product\": \"Looker\", \"vendor\": \"Google\", \"versions\": [{\"lessThanOrEqual\": \"24.14\", \"status\": \"affected\", \"version\": \"23.6\", \"versionType\": \"custom\"}]}], \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cp\u003eAn HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\u003c/p\u003e\u003cp\u003eThere are two Looker versions that are hosted by Looker:\u003c/p\u003e\u003cul\u003e\u003cli\u003eLooker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\u003c/li\u003e\u003cli\u003eLooker (original) was not vulnerable to this issue.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\u003cbr\u003e\u003cbr\u003e\u003cspan style=\\\"background-color: rgba(255, 255, 255, 0.95);\\\"\u003eThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://download.looker.com/\\\"\u003eLooker download page\u003c/a\u003e\u003cspan style=\\\"background-color: rgba(255, 255, 255, 0.95);\\\"\u003e.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003eFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\u003c/p\u003e\u003cul\u003e\u003cli\u003e23.12 -\u0026gt; 23.12.123+\u003c/li\u003e\u003cli\u003e23.18 -\u0026gt; 23.18.117+\u003c/li\u003e\u003cli\u003e24.0 -\u0026gt; 24.0.92+\u003c/li\u003e\u003cli\u003e24.6 -\u0026gt; 24.6.77+\u003c/li\u003e\u003cli\u003e24.8 -\u0026gt; 24.8.66+\u003c/li\u003e\u003cli\u003e24.10 -\u0026gt; 24.10.78+\u003c/li\u003e\u003cli\u003e24.12 -\u0026gt; 24.12.56+\u003c/li\u003e\u003cli\u003e24.14 -\u0026gt; 24.14.37+\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003e\u003c/p\u003e\u003cbr\u003e\"}], \"value\": \"An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\\n\\nThere are two Looker versions that are hosted by Looker:\\n\\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\\n * Looker (original) was not vulnerable to this issue.\\n\\n\\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\\n\\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\\n\\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\\n\\n * 23.12 -\u003e 23.12.123+\\n * 23.18 -\u003e 23.18.117+\\n * 24.0 -\u003e 24.0.92+\\n * 24.6 -\u003e 24.6.77+\\n * 24.8 -\u003e 24.8.66+\\n * 24.10 -\u003e 24.10.78+\\n * 24.12 -\u003e 24.12.56+\\n * 24.14 -\u003e 24.14.37+\"}], \"impacts\": [{\"capecId\": \"CAPEC-33\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-33 HTTP Request Smuggling\"}]}], \"metrics\": [{\"cvssV4_0\": {\"Automatable\": \"NOT_DEFINED\", \"Recovery\": \"NOT_DEFINED\", \"Safety\": \"NOT_DEFINED\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"attackVector\": \"NETWORK\", \"baseScore\": 8.9, \"baseSeverity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"providerUrgency\": \"NOT_DEFINED\", \"subAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N\", \"version\": \"4.0\", \"vulnAvailabilityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-444\", \"description\": \"CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"shortName\": \"Google\", \"dateUpdated\": \"2024-10-11T18:22:50.565Z\"}, \"references\": [{\"url\": \"https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"title\": \"HTTP Request Smuggling in Looker\", \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-8912\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-11T18:32:06.265105Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-11T18:32:10.952Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-8912\", \"assignerOrgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Google\", \"dateReserved\": \"2024-09-16T21:00:02.515Z\", \"datePublished\": \"2024-10-11T18:22:50.565Z\", \"dateUpdated\": \"2024-10-11T18:32:20.493Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…