Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.
2020-11-23T17:15:12.720
2024-11-21T05:36:22.330
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | tableau | tableau_server | ≤ 2018.2.27 | Yes |
Application | tableau | tableau_server | ≤ 2018.3.24 | Yes |
Application | tableau | tableau_server | ≤ 2019.1.22 | Yes |
Application | tableau | tableau_server | ≤ 2019.2.18 | Yes |
Application | tableau | tableau_server | ≤ 2019.3.14 | Yes |
Application | tableau | tableau_server | ≤ 2019.4.13 | Yes |
Application | tableau | tableau_server | ≤ 2020.1.10 | Yes |
Application | tableau | tableau_server | ≤ 2020.2.7 | Yes |
Application | tableau | tableau_server | ≤ 2020.3.2 | Yes |