Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Relations between Anthropic and the Trump administration appear to be thawing.

The App Store is booming again, and AI may be the reason

This week in science news: Physicists see pinpricks of darkness faster than light, humans are still evolving and some polar bears are fatter than ever

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries
Identity

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

By March 10, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 10, 2026Database security/vulnerabilities

Cybersecurity researchers have revealed nine cross-tenant vulnerabilities in Google Looker Studio. This vulnerability could allow an attacker to execute arbitrary SQL queries against a victim’s database, potentially exposing sensitive data within an organization’s Google Cloud environment.

Tenable collectively refers to these shortcomings as LeakyLooker. There is no evidence that this vulnerability has been exploited in the wild. After responsible disclosure in June 2025, Google addressed the issue.

Here is a list of security flaws:

“This vulnerability violates fundamental design assumptions and exposes a new class of attacks that could allow an attacker to exfiltrate, insert, or delete data on a victim’s services or Google Cloud environment,” security researcher Liv Matan said in a report shared with Hacker News.

“These vulnerabilities could potentially expose sensitive data across Google Cloud Platform (GCP) environments, impacting organizations using Google Sheets, BigQuery, Spanner, PostgreSQL, MySQL, Cloud Storage, and nearly all other Looker Studio data connectors.”

Successful exploitation of cross-tenant flaws could allow threat actors to access datasets and projects across different cloud tenants.

An attacker could scan Looker Studio’s public reports or gain access to private reports that use these connectors (such as BigQuery) to gain control of the database and allow them to run arbitrary SQL queries across the owner’s GCP projects.

Alternatively, the victim creates the report as public or shares it with specific recipients and uses a JDBC-connected data source such as PostgreSQL. In this scenario, an attacker could exploit a logical flaw in the report copy functionality to create a duplicate report while retaining the original owner’s credentials, allowing them to delete or modify the table.

Another high-impact vector detailed by the cybersecurity firm involves one-click data exfiltration, where sharing a specially crafted report executes malicious code in a victim’s browser, accessing attacker-controlled projects and rebuilding entire databases from logs.

“This vulnerability breaks the fundamental promise that ‘viewers’ can never control the data they are viewing,” Matan said, adding that “an attacker could potentially leak or modify data across Google services, including BigQuery and Google Sheets.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe SpaceX veteran says the next big thing in space is a satellite returning to Earth.
Next Article Fallen meteorite punches a hole in the roof of a German house after a spectacular ‘fireball’ explosion over Europe

Related Posts

$13.74 million hack shuts down authorized Grinex exchange after tip-off

April 18, 2026

Mirai Variant Nexcorium exploits CVE-2024-3721 to hijack TBK DVR and attack DDoS botnet

April 18, 2026

Three Microsoft Defender zero-days were actively exploited. 2 are not yet patched

April 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Relations between Anthropic and the Trump administration appear to be thawing.

The App Store is booming again, and AI may be the reason

This week in science news: Physicists see pinpricks of darkness faster than light, humans are still evolving and some polar bears are fatter than ever

$13.74 million hack shuts down authorized Grinex exchange after tip-off

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.