New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解主要内容。 文章讲的是Google Looker Studio发现了九个跨租户漏洞,这些漏洞可能让攻击者运行任意SQL查询,窃取敏感数据。Tenable将这些漏洞命名为LeakyLooker,没有证据显示被利用过,但已经在6月修复了。 接下来,我需要提取关键信息:漏洞数量、影响、命名、修复情况以及潜在风险。然后用简洁的语言把这些点连贯起来,确保不超过100字。 可能的结构是:Google Looker Studio发现九个漏洞,允许攻击者窃取数据,命名LeakyLooker,已修复。这样既涵盖了主要信息又简洁明了。 </think> 研究人员披露了Google Looker Studio中的九个跨租户漏洞(统称为LeakyLooker),这些漏洞可能允许攻击者在受害者数据库上运行任意SQL查询并窃取敏感数据。这些漏洞在6月被报告后已得到修复。 2026-3-10 13:20:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Database Security / Vulnerability

Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims' databases and exfiltrate sensitive data within organizations' Google Cloud environments.

The shortcomings have been collectively named LeakyLooker by Tenable. There is no evidence that the vulnerabilities were exploited in the wild. Following responsible disclosure in June 2025, the issues have been addressed by Google.

The list of security flaws is as follows -

"The vulnerabilities broke fundamental design assumptions, revealed a new attack class, and could have allowed attackers to exfiltrate, insert, and delete data in victims' services and Google Cloud environment," security researcher Liv Matan said in a report shared with The Hacker News.

"These vulnerabilities exposed sensitive data across Google Cloud Platform (GCP) environments, potentially affecting any organization using Google Sheets, BigQuery, Spanner, PostgreSQL, MySQL, Cloud Storage, and almost any other Looker Studio data connector."

Successful exploitation of the cross-tenant flaws could enable threat actors to gain access to entire datasets and projects across different cloud tenants.

Attackers could scan for public Looker Studio reports or obtain access to private ones that use these connectors (e.g., BigQuery) and seize control of the databases, allowing them to run arbitrary SQL queries across the owner's entire GCP project.

Alternatively, a victim creates a report as public or shares it with a specific recipient, and uses a JDBC-connected data source such as PostgreSQL. In this scenario, the attacker can take advantage of a logic flaw in the copy report feature that makes it possible to clone reports while retaining the original owner's credentials, enabling them to delete or modify tables.

Another high-impact path detailed by the cybersecurity company involved one-click data exfiltration, where sharing a specially crafted report forces a victim's browser to execute malicious code that contacts an attacker-controlled project to reconstruct entire databases from logs.

"The vulnerabilities broke the fundamental promise that a 'Viewer' should never be able to control the data they are viewing," Matan said, adding they "could have let attackers exfiltrate or modify data across Google services like BigQuery and Google Sheets."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/new-leakylooker-flaws-in-google-looker.html
如有侵权请联系:admin#unsafe.sh