Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

FortiGate devices are exploited to infiltrate the network and steal service account credentials

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

Legora reaches $5.55 billion valuation as AI legal technology boom continues

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries
Identity

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

userBy userMarch 10, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 10, 2026Database security/vulnerabilities

Cybersecurity researchers have revealed nine cross-tenant vulnerabilities in Google Looker Studio. This vulnerability could allow an attacker to execute arbitrary SQL queries against a victim’s database, potentially exposing sensitive data within an organization’s Google Cloud environment.

Tenable collectively refers to these shortcomings as LeakyLooker. There is no evidence that this vulnerability has been exploited in the wild. After responsible disclosure in June 2025, Google addressed the issue.

Here is a list of security flaws:

“This vulnerability violates fundamental design assumptions and exposes a new class of attacks that could allow an attacker to exfiltrate, insert, or delete data on a victim’s services or Google Cloud environment,” security researcher Liv Matan said in a report shared with Hacker News.

“These vulnerabilities could potentially expose sensitive data across Google Cloud Platform (GCP) environments, impacting organizations using Google Sheets, BigQuery, Spanner, PostgreSQL, MySQL, Cloud Storage, and nearly all other Looker Studio data connectors.”

Successful exploitation of cross-tenant flaws could allow threat actors to access datasets and projects across different cloud tenants.

An attacker could scan Looker Studio’s public reports or gain access to private reports that use these connectors (such as BigQuery) to gain control of the database and allow them to run arbitrary SQL queries across the owner’s GCP projects.

Alternatively, the victim creates the report as public or shares it with specific recipients and uses a JDBC-connected data source such as PostgreSQL. In this scenario, an attacker could exploit a logical flaw in the report copy functionality to create a duplicate report while retaining the original owner’s credentials, allowing them to delete or modify the table.

Another high-impact vector detailed by the cybersecurity firm involves one-click data exfiltration, where sharing a specially crafted report executes malicious code in a victim’s browser, accessing attacker-controlled projects and rebuilding entire databases from logs.

“This vulnerability breaks the fundamental promise that ‘viewers’ can never control the data they are viewing,” Matan said, adding that “an attacker could potentially leak or modify data across Google services, including BigQuery and Google Sheets.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSpecialist palliative care saves thousands and improves lives across the NHS
Next Article YouTube extends AI deepfake detection to politicians, government officials, and journalists
user
  • Website

Related Posts

FortiGate devices are exploited to infiltrate the network and steal service account credentials

March 10, 2026

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

March 10, 2026

Webinar guide to audit modern agent workflows

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

FortiGate devices are exploited to infiltrate the network and steal service account credentials

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

Legora reaches $5.55 billion valuation as AI legal technology boom continues

Meta acquired Moltbook, a social network of AI agents that went viral with fake posts.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.