Description
A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.100+ * 24.18.192+ * 25.0.69+ * 25.6.57+ * 25.8.39+ * 25.10.22+
Problem types
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Product status
Any version before 24.12.100
Any version before 24.18.192
Any version before 25.0.69
Any version before 25.6.57
Any version before 25.8.39
Any version before 25.10.22
Any version before 24.12.100
Any version before 24.18.192
Any version before 25.0.69
Any version before 25.6.57
Any version before 25.8.39
Any version before 25.10.22
Credits
Tomas Lažauninkas
References
cloud.google.com/support/bulletins