Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2h5q-w7wv-63r9

Опубликовано: 19 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.1

Описание

An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance.

Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these.

Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :

  • 24.12.103+
  • 24.18.195+
  • 25.0.72+
  • 25.6.60+
  • 25.8.42+
  • 25.10.22+

An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance.

Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these.

Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :

  • 24.12.103+
  • 24.18.195+
  • 25.0.72+
  • 25.6.60+
  • 25.8.42+
  • 25.10.22+

EPSS

Процентиль: 19%
0.0006
Низкий

7.1 High

CVSS4

Дефекты

CWE-362

Связанные уязвимости

nvd
3 месяца назад

An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.12.103+ * 24.18.195+ * 25.0.72+ * 25.6.60+ * 25.8.42+ * 25.10.22+

EPSS

Процентиль: 19%
0.0006
Низкий

7.1 High

CVSS4

Дефекты

CWE-362