Lucene search

K
cveSalesforceCVE-2020-6939
HistoryNov 23, 2020 - 5:15 p.m.

CVE-2020-6939

2020-11-2317:15:12
Salesforce
web.nvd.nist.gov
101
tableau server
site-specific saml
unauthenticated access
account takeover
cve-2020-6939

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.002

Percentile

60.7%

Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.

Affected configurations

Nvd
Node
tableautableau_serverRange2018.22018.2.27
OR
tableautableau_serverRange2018.32018.3.24
OR
tableautableau_serverRange2019.12019.1.22
OR
tableautableau_serverRange2019.22019.2.18
OR
tableautableau_serverRange2019.32019.3.14
OR
tableautableau_serverRange2019.42019.4.13
OR
tableautableau_serverRange2020.12020.1.10
OR
tableautableau_serverRange2020.22020.2.7
OR
tableautableau_serverRange2020.32020.3.2
VendorProductVersionCPE
tableautableau_server*cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Tableau Server",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "versions affected on both Windows and Linux are: 2018.2 through 2018.2.27"
      },
      {
        "status": "affected",
        "version": "2018.3 through 2018.3.24"
      },
      {
        "status": "affected",
        "version": "2019.1 through 2019.1.22"
      },
      {
        "status": "affected",
        "version": "2019.2 through 2019.2.18"
      },
      {
        "status": "affected",
        "version": "2019.3 through 2019.3.14"
      },
      {
        "status": "affected",
        "version": "2019.4 through 2019.4.13"
      },
      {
        "status": "affected",
        "version": "2020.1 through 2020.1.10"
      },
      {
        "status": "affected",
        "version": "2020.2 through 2020.2.7"
      },
      {
        "status": "affected",
        "version": "2020.3 through 2020.3.2"
      }
    ]
  }
]

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.002

Percentile

60.7%

Related for CVE-2020-6939