Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.
References
Link | Resource |
---|---|
https://help.salesforce.com/articleView?id=000355686&type=1&mode=1 | Third Party Advisory |
https://help.salesforce.com/articleView?id=000355686&type=1&mode=1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://help.salesforce.com/articleView?id=000355686&type=1&mode=1 - Third Party Advisory |
Information
Published : 2020-11-23 17:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6939
Mitre link : CVE-2020-6939
CVE.ORG link : CVE-2020-6939
JSON object : View
Products Affected
tableau
- tableau_server
CWE