LookOut Discovering RCE and Internal Access on Looker (Googl... #1857
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
Source: Tenable Research (LookOut) blog post dated February 4, 2026.
Scope: Two vulnerabilities in Google Looker (not Looker Studio) that can lead to (1) remote code execution on the Looker server via a multi-primitive Git hooks chain and (2) full internal MySQL metadata DB exfiltration via an au...
🔧 Technical Details
1) Git
hooksPathoverride → hook execution → RCE: If an application writes/rewrites a Git repo’s.git/configand concatenates user-controlled input intohooksPath, an attacker may inject traversal (e.g.,../../..) to redirect hooks to an attacker-chosen directory. To weaponize, ensure the server populates that directory with a hook file named likepre-commitand guarantee the executable bit is preserved across clones by setting it in Git metadata (e.g.,git update-index --chmod=+x <file>, which stores mode100755). Then trigger a native Git action that runs hooks (e.g.,git commit) to execute the payload.2) Create prerequisite directories by abusing clone destination/path controls: When a server-side “clone dependency” feature uses user-influenced paths (e.g., via dependency fields like
refor other parameters that affect...🤖 Agent Actions
Updated HackTricks with Looker-derived techniques:
hooksPathtraversal, forced directory creation via clone paths, executable hook preparation (git update-index --chmod=+x), identifying native Git execution paths vs. JGit, and racing sanitization writes. Added cross-links to path traversal and race condition guidance plus referenced the Tenable LookOut blog.updatexml()+concat()+LIMIT/OFFSETto leak data through XPATH errors, and updated references with the LookOut source.This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.