FKIE_CVE-2024-8912
Vulnerability from fkie_nvd - Published: 2024-10-11 19:15 - Updated: 2025-07-30 15:23
Severity ?
Summary
An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.
There are two Looker versions that are hosted by Looker:
* Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.
* Looker (original) was not vulnerable to this issue.
Customer-hosted Looker instances were found to be vulnerable and must be upgraded.
This vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .
For Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:
* 23.12 -> 23.12.123+
* 23.18 -> 23.18.117+
* 24.0 -> 24.0.92+
* 24.6 -> 24.6.77+
* 24.8 -> 24.8.66+
* 24.10 -> 24.10.78+
* 24.12 -> 24.12.56+
* 24.14 -> 24.14.37+
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cloud_looker | * | ||
| cloud_looker | * | ||
| cloud_looker | * | ||
| cloud_looker | * | ||
| cloud_looker | * | ||
| cloud_looker | * | ||
| cloud_looker | * | ||
| cloud_looker | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4484C2-20F0-45FE-92D0-03FCDF9EF7CA",
"versionEndExcluding": "23.12.123",
"versionStartIncluding": "23.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9334915-5D2B-45CB-9286-42307094445A",
"versionEndExcluding": "23.18.117",
"versionStartIncluding": "23.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "954CFC0A-7632-4B43-BAC5-78D63E2CE3AD",
"versionEndExcluding": "24.0.92",
"versionStartIncluding": "24.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0FD97D2-8EE5-4BF6-B38F-E187A7972804",
"versionEndExcluding": "24.6.77",
"versionStartIncluding": "24.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4857875-6656-4711-9BAA-3EF8506F8E81",
"versionEndExcluding": "24.8.66",
"versionStartIncluding": "24.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D802F86A-8BB3-4D64-9899-610893BDD0B9",
"versionEndExcluding": "24.10.78",
"versionStartIncluding": "24.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "331DDAF4-C8B9-44F0-8F55-0FCCFC65A4A4",
"versionEndExcluding": "24.12.56",
"versionStartIncluding": "24.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:cloud_looker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA7AAC28-6AD0-4875-AE6C-504A85C5974D",
"versionEndExcluding": "24.14.37",
"versionStartIncluding": "24.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An HTTP Request Smuggling vulnerability in Looker allowed an unauthorized attacker to capture HTTP responses destined for legitimate users.\n\nThere are two Looker versions that are hosted by Looker:\n\n * Looker (Google Cloud core) was found to be vulnerable. This issue has already been mitigated and our investigation has found no signs of exploitation.\n * Looker (original) was not vulnerable to this issue.\n\n\nCustomer-hosted Looker instances were found to be vulnerable and must be upgraded.\n\nThis vulnerability has been patched in all supported versions of customer-hosted Looker, which are available on the Looker download page https://download.looker.com/ .\n\nFor Looker customer-hosted instances, please update to the latest supported version of Looker as soon as possible. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page:\n\n * 23.12 -\u003e 23.12.123+\n * 23.18 -\u003e 23.18.117+\n * 24.0 -\u003e 24.0.92+\n * 24.6 -\u003e 24.6.77+\n * 24.8 -\u003e 24.8.66+\n * 24.10 -\u003e 24.10.78+\n * 24.12 -\u003e 24.12.56+\n * 24.14 -\u003e 24.14.37+"
},
{
"lang": "es",
"value": "Una vulnerabilidad de contrabando de solicitudes HTTP en Looker permiti\u00f3 que un atacante no autorizado capturara respuestas HTTP destinadas a usuarios leg\u00edtimos. Hay dos versiones de Looker alojadas por Looker: * Se descubri\u00f3 que Looker (n\u00facleo de Google Cloud) era vulnerable. Este problema ya se ha mitigado y nuestra investigaci\u00f3n no ha encontrado signos de explotaci\u00f3n. * Looker (original) no era vulnerable a este problema. Se descubri\u00f3 que las instancias de Looker alojadas por el cliente eran vulnerables y deben actualizarse. Esta vulnerabilidad se ha corregido en todas las versiones compatibles de Looker alojadas por el cliente, que est\u00e1n disponibles en la p\u00e1gina de descarga de Looker https://download.looker.com/ . Para las instancias de Looker alojadas por el cliente, actualice a la \u00faltima versi\u00f3n compatible de Looker lo antes posible. Las versiones a continuaci\u00f3n se han actualizado para proteger contra esta vulnerabilidad. Puede descargar estas versiones en la p\u00e1gina de descarga de Looker: * 23.12 -\u0026gt; 23.12.123+ * 23.18 -\u0026gt; 23.18.117+ * 24.0 -\u0026gt; 24.0.92+ * 24.6 -\u0026gt; 24.6.77+ * 24.8 -\u0026gt; 24.8.66+ * 24.10 -\u0026gt; 24.10.78+ * 24.12 -\u0026gt; 24.12.56+ * 24.14 -\u0026gt; 24.14.37+"
}
],
"id": "CVE-2024-8912",
"lastModified": "2025-07-30T15:23:41.213",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.9,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cve-coordination@google.com",
"type": "Secondary"
}
]
},
"published": "2024-10-11T19:15:11.110",
"references": [
{
"source": "cve-coordination@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cloud.google.com/looker/docs/best-practices/security-bulletin-09-16-24"
}
],
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-444"
}
],
"source": "cve-coordination@google.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…