Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk

February 11, 2026

Galaxy Unpacked Is Occurring February twenty fifth

February 11, 2026

Aberdeen launches ‘life occasion’ web site for residents

February 11, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk
  • Galaxy Unpacked Is Occurring February twenty fifth
  • Aberdeen launches ‘life occasion’ web site for residents
  • Nationwide Robotics Week 2026 Underscores Robotics as a Essential U.S. Business and Workforce Engine
  • Astrophotography Improve: Stepping As much as CMOS
  • The Trump T1 Smartphone Lastly Surfaces, Gold End and All
  • Decoding ESOPs: A newbie’s information to worker possession
  • SCOPE Summit 2026: How Fee Practices and Operational Burden Are Altering Website Habits
Wednesday, February 11
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Google Looker Bugs Enable Cross-Tenant RCE, Knowledge Exfil
Cybersecurity & Digital Rights

Google Looker Bugs Enable Cross-Tenant RCE, Knowledge Exfil

NextTechBy NextTechFebruary 9, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Google Looker Bugs Enable Cross-Tenant RCE, Knowledge Exfil
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers have recognized two five-alarm safety points in a preferred Google information service, both of which may enable attackers entry to delicate secrets and techniques helpful for rampant lateral motion.

Looker — to not be confused with the extra pared down Looker Studio — is a heavyweight enterprise intelligence and information analytics platform. It is mainly a dashboard for modeling information, creating visualizations, and extra. In keeping with information aggregator TheirStack, it is utilized by greater than 60,000 corporations, together with model names like Wayfair, Coinbase, and Walmart.

“In a typical enterprise, Looker is not only a dashboard — it’s the central nervous system for information,” says Liv Matan, senior analysis engineer at Tenable. It makes for a really perfect goal for cyberattacks, he says, not least as a result of “an ordinary group may need Looker linked to twenty to 50-plus information sources, starting from large warehouses like BigQuery to delicate operational databases like PostgreSQL and MySQL.”

Associated:Shai-hulud: The Hidden Price of Provide Chain Assaults

On Feb. 4, Matan described a distant code execution (RCE) chain in Looker that might enable an attacker to succeed in the infrastructure it is operating on and even, in cloud deployments, acquire entry to different tenants. He additionally described a separate SQL injection vulnerability helpful for accessing all that information this system manages.

Exfiltration of Database Secrets and techniques

The primary, much less extreme of the 2 findings issues Looker’s inner database, which shops consumer lists, secrets and techniques, and configurations. It is presupposed to be hid from the consumer. The researchers discovered the title of the inner database’s connection in logs, although, and took benefit. They created a brand new undertaking, intercepted the HTTP request in transit, and modified the parameter that pointed to their very own allowed database to as a substitute level to the delicate hidden one.

Now they’d a connection to it, however not but a solution to view what was inside. For that they carried out error-based SQL injection, operating queries that they knew would set off error messages, but throughout the error messages have been the actual, secret information they sought. By doing this over and over, theoretically, they might have slowly dumped your entire contents of the inner database.

A malicious actor may use this vulnerability to steal secrets and techniques and configurations and carry out follow-on assaults inside Looker. It is now being tracked as CVE-2025-12743, and it earned a mid-grade Widespread Vulnerability Scoring System (CVSS) score of 6.0 out of 10.

Cross-Tenant RCE in Google Looker

Extra considerably, Matan and his colleagues developed an exploit chain permitting them to run arbitrary code on a Looker server.

Associated:OpenClaw’s Gregarious Insecurities Make Secure Utilization Tough

They started with a path traversal. Each Looker undertaking is a Git repository at coronary heart, and by crafting their very own distant dependency, they have been in a position to manipulate the place the Git system seems for “hooks” — highly effective scripts that run routinely when sure occasions happen. The researchers pointed the system to a listing they managed, tricking Looker into downloading their very own customized hooks that, when run, would execute a distant shell for his or her enjoyment.

This truly did not work at first. It turned out that Looker makes use of a selected model of Git known as “JGit,” by default, which does not assist Git hooks. They appeared more durable, although, and located a solution to make Looker use Git as a substitute of JGit, through the use of particular POST parameters when creating their repository.

That wasn’t the one downside. Earlier than operating any Git instructions, Looker overwrites the Git config file, resetting the hooks path the researchers had manipulated again to a protected state. To beat this they triggered a race situation, spamming this system to sneak their malicious overwrite in between the time when Looker reset the config file to a protected state, and when it was time to run hooks. This labored after a number of tries.

Associated:Attackers Use Home windows Screensavers to Drop Malware, RMM Instruments

Because of this, the researchers have been in a position to run no matter code they wished on the Looker server. They might have accessed extremely delicate information or carried out lateral motion within the compromised goal’s surroundings, for starters. Worst of all, although, they discovered that on the Google Cloud Platform (GCP), as a result of a number of prospects would possibly run Looker on the identical infrastructure — with shared folders housing service account credentials — an attacker with RCE on the server may additionally entry different organizations’ cloud environments and information, too.

The Problem in Patching Looker

Google mounted the 2 points in Looker shortly after Tenable first reported them. Organizations that deploy it on-premises might want to replace manually to one of many variations deemed safe in Google’s safety bulletin GCP-2025-052.

Doing so will not be trivial. “It requires important time and technical effort. As a result of Looker acts as a central nervous system for a corporation’s most delicate information, some organizations might delay updating as a result of they concern unintended system downtime or technical glitches that might disrupt their enterprise,” Matan says.

There are different causes to delay. “Organizations typically face logistical roadblocks like inflexible change administration home windows that forbid system updates throughout peak enterprise hours. They could additionally want prolonged time for compatibility testing to make sure the patch doesn’t break customized connections to different databases or third-party instruments,” provides Matan. “Moreover, an absence of a transparent asset stock can result in shadow IT, the place hidden or forgotten cases of the software program stay unpatched just because the central IT workforce is not conscious they exist.”

Patching is not a be-all and end-all, both. Organizations could be effectively suggested to all the time observe the precept of least privilege and isolate their Looker cases as they’d another high-risk property. “Put it in a devoted community section in order that even when it is compromised, an attacker cannot simply attain your core area controllers or different servers,” Matan says.



Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s tendencies in the present day: learn extra, subscribe to our e-newsletter, and turn into a part of the NextTech group at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

In Bypassing MFA, ZeroDayRAT Is ‘Textbook Stalkerware’

February 11, 2026

Fortinet Patches Crucial SQLi Flaw Enabling Unauthenticated Code Execution

February 10, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Marketing campaign

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk

By NextTechFebruary 11, 2026

South Korea’s meals supply market is testing a brand new entrance finish. Yogiyo has change…

Galaxy Unpacked Is Occurring February twenty fifth

February 11, 2026

Aberdeen launches ‘life occasion’ web site for residents

February 11, 2026
Top Trending

Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk

By NextTechFebruary 11, 2026

South Korea’s meals supply market is testing a brand new entrance finish.…

Galaxy Unpacked Is Occurring February twenty fifth

By NextTechFebruary 11, 2026

Samsung dropped their Galaxy Unpacked announcement this night, and it is best…

Aberdeen launches ‘life occasion’ web site for residents

By NextTechFebruary 11, 2026

The web site and enhanced webchat service offers residents a clearer and…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!