Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-6939


Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.


Published

2020-11-23T17:15:12.720

Last Modified

2024-11-21T05:36:22.330

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tableau tableau_server ≤ 2018.2.27 Yes
Application tableau tableau_server ≤ 2018.3.24 Yes
Application tableau tableau_server ≤ 2019.1.22 Yes
Application tableau tableau_server ≤ 2019.2.18 Yes
Application tableau tableau_server ≤ 2019.3.14 Yes
Application tableau tableau_server ≤ 2019.4.13 Yes
Application tableau tableau_server ≤ 2020.1.10 Yes
Application tableau tableau_server ≤ 2020.2.7 Yes
Application tableau tableau_server ≤ 2020.3.2 Yes

References