Skip navigation
1 2 3 Previous Next

Security Bulletins

89 Posts authored by: Tyler Reeves Employee

Highest overall severity: High


Summary:

In certain scenarios a flow running in Prep Conductor will use the wrong OAuth credentials when authenticating to a data source.


Impact:

A malicious flow can be constructed that can use the wrong credentials to retreive data from a data source that the flow owner does not have access to.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: High
CVSS3 Score: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N - 7.7 High
Product Specific Notes: This only affects Tableau Server instances with the Data Management Add-On which includes the Prep Conductor feature.

Vulnerable versions:

  • Tableau Server on Linux 2019.3.0 through 2019.3.4
  • Tableau Server on Linux 2019.4.0 through 2019.4.3

  • Tableau Server on Windows 2019.3.0 through 2019.3.4
  • Tableau Server on Windows 2019.4.0 through 2019.4.3


Resolved in versions:

  • Tableau Server on Linux 2019.3.5
  • Tableau Server on Linux 2019.4.4

  • Tableau Server on Windows 2019.3.5
  • Tableau Server on Windows 2019.4.4


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

When a dashboard is configured with a button to go to another sheet, the target sheet permissions are ignored for the current user. This scenario may occur if the workbook has been configured to "Hide Tabs," which sets explicit view permissions, rather than inheriting permissions from the workbook.


Impact:

A user that has access to a dashboard can also navigate to a sheet within that workbook, that they may not have access to.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N - 5.3 Medium
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Server on Linux 2018.3.0 through 2018.3.14
  • Tableau Server on Linux 2019.1.0 through 2019.1.12
  • Tableau Server on Linux 2019.2.0 through 2019.2.8
  • Tableau Server on Linux 2019.3.0 through 2019.3.4
  • Tableau Server on Linux 2019.4.0 through 2019.4.3
  • Tableau Server on Linux 2020.1.0 through 2020.1.1

  • Tableau Server on Windows 2018.3.0 through 2018.3.14
  • Tableau Server on Windows 2019.1.0 through 2019.1.12
  • Tableau Server on Windows 2019.2.0 through 2019.2.8
  • Tableau Server on Windows 2019.3.0 through 2019.3.4
  • Tableau Server on Windows 2019.4.0 through 2019.4.3
  • Tableau Server on Windows 2020.1.0 through 2020.1.1


Resolved in versions:

  • Tableau Server on Linux 2018.3.15
  • Tableau Server on Linux 2019.1.13
  • Tableau Server on Linux 2019.2.9
  • Tableau Server on Linux 2019.3.5
  • Tableau Server on Linux 2019.4.4
  • Tableau Server on Linux 2020.1.2

  • Tableau Server on Windows 2018.3.15
  • Tableau Server on Windows 2019.1.13
  • Tableau Server on Windows 2019.2.9
  • Tableau Server on Windows 2019.3.5
  • Tableau Server on Windows 2019.4.4
  • Tableau Server on Windows 2020.1.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

Tableau Server logs the internal secret used to authenticate internal service requests when the logl.level is set to Debug. The log.level is set to Info by default and the internal secret is generated at install time.


Impact:

An attacker with access to the log file can make internal service requests.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N - 4.4 Medium
Product Specific Notes: None

Vulnerable versions:

  • Tableau Server on Linux 2019.3.0 through 2019.3.4
  • Tableau Server on Linux 2019.4.0 through 2019.4.3

  • Tableau Server on Windows 2019.3.0 through 2019.3.4
  • Tableau Server on Windows 2019.4.0 through 2019.4.3


Resolved in versions:

  • Tableau Server on Linux 2019.3.5
  • Tableau Server on Linux 2019.4.4

  • Tableau Server on Windows 2019.3.5
  • Tableau Server on Windows 2019.4.4


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

Tableau Server fails to properly validate the path that is presented on an embedded authentication redirect page. This is the same issue described in ADV-2019-047. The previous fix was incomplete.

The following CVEs have been addressed:


Impact:

A Tableau Server user who clicks on a malicious link could initiate a reflected cross-site scripting (XSS) operation with JavaScript, which runs in the client context. Alternatively, a Tableau Server user who clicks on a malicious link could be redirected to an attacker-controlled location.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N - 4.3 Medium
Product Specific Notes: None

Vulnerable versions:

  • Tableau Server on Linux 10.5.0 through 10.5.23
  • Tableau Server on Linux 2018.1.0 through 2018.1.20
  • Tableau Server on Linux 2018.2.0 through 2018.2.17
  • Tableau Server on Linux 2018.3.0 through 2018.3.14
  • Tableau Server on Linux 2019.1.0 through 2019.1.12
  • Tableau Server on Linux 2019.2.0 through 2019.2.8
  • Tableau Server on Linux 2019.3.0 through 2019.3.4
  • Tableau Server on Linux 2019.4.0 through 2019.4.3

  • Tableau Server on Windows 10.4.0 through 10.4.24
  • Tableau Server on Windows 10.5.0 through 10.5.23
  • Tableau Server on Windows 2018.1.0 through 2018.1.20
  • Tableau Server on Windows 2018.2.0 through 2018.2.17
  • Tableau Server on Windows 2018.3.0 through 2018.3.14
  • Tableau Server on Windows 2019.1.0 through 2019.1.12
  • Tableau Server on Windows 2019.2.0 through 2019.2.8
  • Tableau Server on Windows 2019.3.0 through 2019.3.4
  • Tableau Server on Windows 2019.4.0 through 2019.4.3


Resolved in versions:

  • Tableau Server on Linux 10.5.24
  • Tableau Server on Linux 2018.1.21
  • Tableau Server on Linux 2018.2.18
  • Tableau Server on Linux 2018.3.15
  • Tableau Server on Linux 2019.1.13
  • Tableau Server on Linux 2019.2.9
  • Tableau Server on Linux 2019.3.5
  • Tableau Server on Linux 2019.4.4

  • Tableau Server on Windows 10.4.25
  • Tableau Server on Windows 10.5.24
  • Tableau Server on Windows 2018.1.21
  • Tableau Server on Windows 2018.2.18
  • Tableau Server on Windows 2018.3.15
  • Tableau Server on Windows 2019.1.13
  • Tableau Server on Windows 2019.2.9
  • Tableau Server on Windows 2019.3.5
  • Tableau Server on Windows 2019.4.4


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

When using Tableau Prep Builder to connect to published datasources, sensitive information is logged to the application log files. This is the same issue as described in ADV-2019-038. The fix in ADV-2019-038 was incorrectly applied to Tableau Server 2018.1.


Impact:

An attacker with access to the application log files can learn tokens that can be used to authenticate to Tableau Server.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N - 4.4 Medium
Product Specific Notes: For Tableau Server on Windows 2018.1 and Tableau Server on Linux 2018.1 the information will only  appear in the application logs under certain conditions: a vulnerable version of Tableau Prep Builder must be used  to connect to the published datasource on that specific Tableau Server instance. Only the application logs on that  specific Tableau Server instance will include the information. See ADV-2019-038 for the list of vulnerable Tableau Prep Builder versions.

Vulnerable versions:

  • Tableau Server on Linux 2018.1.0 through 2018.1.20

  • Tableau Server on Windows 2018.1.0 through 2018.1.20


Resolved in versions:

  • Tableau Server on Linux 2018.1.21

  • Tableau Server on Windows 2018.1.21


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

When using an ODBC Data Source Name, sensitive values configured in the DSN can appear in the debug logs.


Impact:

Access to the log files can expose sensitive values.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N - 4.4 Medium
Product Specific Notes: This only occurs when the log.level is set to Debug.

Vulnerable versions:

  • Tableau Server on Linux 10.5.0 through 10.5.22
  • Tableau Server on Linux 2018.1.0 through 2018.1.19
  • Tableau Server on Linux 2018.2.0 through 2018.2.16
  • Tableau Server on Linux 2018.3.0 through 2018.3.13
  • Tableau Server on Linux 2019.1.0 through 2019.1.11
  • Tableau Server on Linux 2019.2.0 through 2019.2.7
  • Tableau Server on Linux 2019.3.0 through 2019.3.3


Resolved in versions:

  • Tableau Server on Linux 10.5.23
  • Tableau Server on Linux 2018.1.20
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4


Tableau Desktop (Back to top of page)

Severity: Medium
CVSS3 Score: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N - 4.4 Medium
Product Specific Notes: This only occurs when the log.level is set to Debug.

Vulnerable versions:

  • Tableau Desktop on Mac 10.4.0 through 10.4.23
  • Tableau Desktop on Mac 10.5.0 through 10.5.22
  • Tableau Desktop on Mac 2018.1.0 through 2018.1.19
  • Tableau Desktop on Mac 2018.2.0 through 2018.2.16
  • Tableau Desktop on Mac 2018.3.0 through 2018.3.13
  • Tableau Desktop on Mac 2019.1.0 through 2019.1.11
  • Tableau Desktop on Mac 2019.2.0 through 2019.2.7
  • Tableau Desktop on Mac 2019.3.0 through 2019.3.3


Resolved in versions:

  • Tableau Desktop on Mac 10.4.24
  • Tableau Desktop on Mac 10.5.23
  • Tableau Desktop on Mac 2018.1.20
  • Tableau Desktop on Mac 2018.2.17
  • Tableau Desktop on Mac 2018.3.14
  • Tableau Desktop on Mac 2019.1.12
  • Tableau Desktop on Mac 2019.2.8
  • Tableau Desktop on Mac 2019.3.4


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: High


Summary:

Multiple fixes have been addressed for vulnerabilities in QtWebEngine.

The following CVEs have been addressed:


Impact:

Attacker might cause denial of service or read data in memory.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H - 6.5 Medium
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Server on Linux 10.4 through 10.4.23
  • Tableau Server on Linux 10.5 through 10.5.22
  • Tableau Server on Linux 2018.1 through 2018.1.19
  • Tableau Server on Linux 2018.2 through 2018.2.16
  • Tableau Server on Linux 2018.3 through 2018.3.13
  • Tableau Server on Linux 2019.1 through 2019.1.11
  • Tableau Server on Linux 2019.2 through 2019.2.7
  • Tableau Server on Linux 2019.3 through 2019.3.3
  • Tableau Server on Linux 2019.4 through 2019.4.1

  • Tableau Server on Windows 10.4 through 10.4.23
  • Tableau Server on Windows 10.5 through 10.5.22
  • Tableau Server on Windows 2018.1 through 2018.1.19
  • Tableau Server on Windows 2018.2 through 2018.2.16
  • Tableau Server on Windows 2018.3 through 2018.3.13
  • Tableau Server on Windows 2019.1 through 2019.1.11
  • Tableau Server on Windows 2019.2 through 2019.2.7
  • Tableau Server on Windows 2019.3 through 2019.3.3
  • Tableau Server on Windows 2019.4 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 10.4.24
  • Tableau Server on Linux 10.5.23
  • Tableau Server on Linux 2018.1.20
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 10.4.24
  • Tableau Server on Windows 10.5.23
  • Tableau Server on Windows 2018.1.20
  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: High
CVSS3 Score: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - 7.0 High
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Desktop on Mac 10.4 through 10.4.23
  • Tableau Desktop on Mac 10.5 through 10.5.22
  • Tableau Desktop on Mac 2018.1 through 2018.1.19
  • Tableau Desktop on Mac 2018.2 through 2018.2.16
  • Tableau Desktop on Mac 2018.3 through 2018.3.13
  • Tableau Desktop on Mac 2019.1 through 2019.1.11
  • Tableau Desktop on Mac 2019.2 through 2019.2.7
  • Tableau Desktop on Mac 2019.3 through 2019.3.3
  • Tableau Desktop on Mac 2019.4 through 2019.4.1

  • Tableau Desktop on Windows 10.4 through 10.4.23
  • Tableau Desktop on Windows 10.5 through 10.5.22
  • Tableau Desktop on Windows 2018.1 through 2018.1.19
  • Tableau Desktop on Windows 2018.2 through 2018.2.16
  • Tableau Desktop on Windows 2018.3 through 2018.3.13
  • Tableau Desktop on Windows 2019.1 through 2019.1.11
  • Tableau Desktop on Windows 2019.2 through 2019.2.7
  • Tableau Desktop on Windows 2019.3 through 2019.3.3
  • Tableau Desktop on Windows 2019.4 through 2019.4.1


Resolved in versions:

  • Tableau Desktop on Mac 10.4.24
  • Tableau Desktop on Mac 10.5.23
  • Tableau Desktop on Mac 2018.1.20
  • Tableau Desktop on Mac 2018.2.17
  • Tableau Desktop on Mac 2018.3.14
  • Tableau Desktop on Mac 2019.1.12
  • Tableau Desktop on Mac 2019.2.8
  • Tableau Desktop on Mac 2019.3.4
  • Tableau Desktop on Mac 2019.4.2

  • Tableau Desktop on Windows 10.4.23
  • Tableau Desktop on Windows 10.5.22
  • Tableau Desktop on Windows 2018.1.20
  • Tableau Desktop on Windows 2018.2.17
  • Tableau Desktop on Windows 2018.3.14
  • Tableau Desktop on Windows 2019.1.12
  • Tableau Desktop on Windows 2019.2.8
  • Tableau Desktop on Windows 2019.3.4
  • Tableau Desktop on Windows 2019.4.2


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: High


Summary:

Various memory corruption issues exist in Tableau products.


Impact:

An attacker exploiting this vulnerability may be able to execute arbitrary code or cause a crash.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: High
CVSS3 Score: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - 7.5 High
Product Specific Notes: An authenticated user that is able to publish a workbook to Tableau Server can trigger this vulnerability.

Vulnerable versions:

  • Tableau Server on Linux 10.5.0 through 10.5.22
  • Tableau Server on Linux 2018.1.0 through 2018.1.19
  • Tableau Server on Linux 2018.2.0 through 2018.2.16
  • Tableau Server on Linux 2018.3.0 through 2018.3.13
  • Tableau Server on Linux 2019.1.0 through 2019.1.11
  • Tableau Server on Linux 2019.2.0 through 2019.2.7
  • Tableau Server on Linux 2019.3.0 through 2019.3.3
  • Tableau Server on Linux 2019.4.0 through 2019.4.1

  • Tableau Server on Windows 10.4.0 through 10.4.23
  • Tableau Server on Windows 10.5.0 through 10.5.22
  • Tableau Server on Windows 2018.1.0 through 2018.1.19
  • Tableau Server on Windows 2018.2.0 through 2018.2.16
  • Tableau Server on Windows 2018.3.0 through 2018.3.13
  • Tableau Server on Windows 2019.1.0 through 2019.1.11
  • Tableau Server on Windows 2019.2.0 through 2019.2.7
  • Tableau Server on Windows 2019.3.0 through 2019.3.3
  • Tableau Server on Windows 2019.4.0 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 10.5.23
  • Tableau Server on Linux 2018.1.20
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 10.4.24
  • Tableau Server on Windows 10.5.23
  • Tableau Server on Windows 2018.1.20
  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: High
CVSS3 Score: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - 7.0 High
Product Specific Notes: Opening a malicious workbook can trigger this vulnerability.

Vulnerable versions:

  • Tableau Desktop on Mac 10.4.0 through 10.4.23
  • Tableau Desktop on Mac 10.5.0 through 10.5.22
  • Tableau Desktop on Mac 2018.1.0 through 2018.1.19
  • Tableau Desktop on Mac 2018.2.0 through 2018.2.16
  • Tableau Desktop on Mac 2018.3.0 through 2018.3.13
  • Tableau Desktop on Mac 2019.1.0 through 2019.1.11
  • Tableau Desktop on Mac 2019.2.0 through 2019.2.7
  • Tableau Desktop on Mac 2019.3.0 through 2019.3.3
  • Tableau Desktop on Mac 2019.4.0 through 2019.4.1

  • Tableau Desktop on Windows 10.4.0 through 10.4.23
  • Tableau Desktop on Windows 10.5.0 through 10.5.22
  • Tableau Desktop on Windows 2018.1.0 through 2018.1.19
  • Tableau Desktop on Windows 2018.2.0 through 2018.2.16
  • Tableau Desktop on Windows 2018.3.0 through 2018.3.13
  • Tableau Desktop on Windows 2019.1.0 through 2019.1.11
  • Tableau Desktop on Windows 2019.2.0 through 2019.2.7
  • Tableau Desktop on Windows 2019.3.0 through 2019.3.3
  • Tableau Desktop on Windows 2019.4.0 through 2019.4.1


Resolved in versions:

  • Tableau Desktop on Mac 10.4.24
  • Tableau Desktop on Mac 10.5.23
  • Tableau Desktop on Mac 2018.1.20
  • Tableau Desktop on Mac 2018.2.17
  • Tableau Desktop on Mac 2018.3.14
  • Tableau Desktop on Mac 2019.1.12
  • Tableau Desktop on Mac 2019.2.8
  • Tableau Desktop on Mac 2019.3.4
  • Tableau Desktop on Mac 2019.4.2

  • Tableau Desktop on Windows 10.4.24
  • Tableau Desktop on Windows 10.5.23
  • Tableau Desktop on Windows 2018.1.20
  • Tableau Desktop on Windows 2018.2.17
  • Tableau Desktop on Windows 2018.3.14
  • Tableau Desktop on Windows 2019.1.12
  • Tableau Desktop on Windows 2019.2.8
  • Tableau Desktop on Windows 2019.3.4
  • Tableau Desktop on Windows 2019.4.2


Tableau Bridge (Back to top of page)

Severity: High
CVSS3 Score: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - 7.0 High
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Bridge on Windows 2018.2 through 20194.19.1211.1636


Resolved in versions:

  • Tableau Bridge on Windows 20194.20.0119.2058


Tableau Prep Builder (Back to top of page)

Severity: High
CVSS3 Score: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - 7.0 High
Product Specific Notes: Opening a malicious flow can trigger this vulnerability.

Vulnerable versions:

  • Tableau Prep on Mac 2018.1.1 through 2019.4.2

  • Tableau Prep on Windows 2018.1.1 through 2019.4.2


Resolved in versions:

  • Tableau Prep on Mac 2020.1.1

  • Tableau Prep on Windows 2020.1.1


Tableau Reader (Back to top of page)

Severity: High
CVSS3 Score: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - 7.0 High
Product Specific Notes: Opening a malicious workbook can trigger this vulnerability.

Vulnerable versions:

  • Tableau Reader on Mac 10.4 through 2019.4.1

  • Tableau Reader on Windows 10.4 through 2019.4.1


Resolved in versions:

  • Tableau Reader on Mac 2019.4.2

  • Tableau Reader on Windows 2019.4.2


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: High
CVSS3 Score: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - 7.0 High
Product Specific Notes: Opening a malicious workbook can trigger this vulnerability.

Vulnerable versions:

  • Tableau Public Desktop on Mac 10.4 through 2019.4.1

  • Tableau Public Desktop on Windows 10.4 through 2019.4.1


Resolved in versions:

  • Tableau Public Desktop on Mac 2019.4.2

  • Tableau Public Desktop on Windows 2019.4.2

Highest overall severity: Medium


Summary:

HTML chacaters are not properly encoded in emails sent to users who are tagged in comments. The previous fix (ADV-2019-041) addressing this vulnerability was  incomplete.


Impact:

A Tableau user can craft phishing emails to other Tableau Server users.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N - 4.3 Medium
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Server on Linux 2018.2.0 through 2018.2.16
  • Tableau Server on Linux 2018.3.0 through 2018.3.13
  • Tableau Server on Linux 2019.1.0 through 2019.1.11
  • Tableau Server on Linux 2019.2.0 through 2019.2.7
  • Tableau Server on Linux 2019.3.0 through 2019.3.3
  • Tableau Server on Linux 2019.4.0 through 2019.4.1

  • Tableau Server on Windows 2018.2.0 through 2018.2.16
  • Tableau Server on Windows 2018.3.0 through 2018.3.13
  • Tableau Server on Windows 2019.1.0 through 2019.1.11
  • Tableau Server on Windows 2019.2.0 through 2019.2.7
  • Tableau Server on Windows 2019.3.0 through 2019.3.3
  • Tableau Server on Windows 2019.4.0 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: High


Summary:

Under certain circumstances, Tableau Server removes authentication on a JMX server, which may allow Remote Code Execution.


Impact:

An attacker can execute arbitrary commands on vulnerable Tableau Server if the JMX RMI port is not protected.


Mitigation:

Implement a host firewall like described in [Step 5 in Tableau server hardening guide] (https://help.tableau.com/current/server/en-us/security_harden.htm) will mitigate this vulnerability


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: High
CVSS3 Score: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H - 7.2 High
Product Specific Notes: Not affected.

Vulnerable versions:

  • Tableau Server on Linux 2019.1 through 2019.1.11
  • Tableau Server on Linux 2019.2 through 2019.2.7
  • Tableau Server on Linux 2019.3 through 2019.3.3
  • Tableau Server on Linux 2019.4 through 2019.4.1

  • Tableau Server on Windows 2019.1 through 2019.1.11
  • Tableau Server on Windows 2019.2 through 2019.2.7
  • Tableau Server on Windows 2019.3 through 2019.3.3
  • Tableau Server on Windows 2019.4 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

When connecting to a datasource from an OAuth connection an error may occur that displays exception information in the return URL. In some cases, the exception information contains the access token used to authenticate to the datasource.


Impact:

URLs appear in browser history and commonly appear in server and proxy logs, thereby potentially exposing the access token to unauthorized users.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N - 6.0 Medium
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Server on Linux 10.5.0 through 10.5.22
  • Tableau Server on Linux 2018.1.0 through 2018.1.19
  • Tableau Server on Linux 2018.2.0 through 2018.2.16
  • Tableau Server on Linux 2018.3.0 through 2018.3.13
  • Tableau Server on Linux 2019.1.0 through 2019.1.11
  • Tableau Server on Linux 2019.2.0 through 2019.2.7
  • Tableau Server on Linux 2019.3.0 through 2019.3.3
  • Tableau Server on Linux 2019.4.0 through 2019.4.1

  • Tableau Server on Windows 10.4.0 through 10.4.23
  • Tableau Server on Windows 10.5.0 through 10.5.22
  • Tableau Server on Windows 2018.1.0 through 2018.1.19
  • Tableau Server on Windows 2018.2.0 through 2018.2.16
  • Tableau Server on Windows 2018.3.0 through 2018.3.13
  • Tableau Server on Windows 2019.1.0 through 2019.1.11
  • Tableau Server on Windows 2019.2.0 through 2019.2.7
  • Tableau Server on Windows 2019.3.0 through 2019.3.3
  • Tableau Server on Windows 2019.4.0 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 10.5.23
  • Tableau Server on Linux 2018.1.20
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 10.4.24
  • Tableau Server on Windows 10.5.23
  • Tableau Server on Windows 2018.1.20
  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

File paths of temporary files are included in the user-facing error messages after a publishing attempt fails.


Impact:

Users can learn some information about the Tableau Server file hierarchy.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N - 4.3 Medium
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Server on Linux 10.4 through 10.4.22
  • Tableau Server on Linux 10.5 through 10.5.21
  • Tableau Server on Linux 2018.1 through 2018.1.18
  • Tableau Server on Linux 2018.2 through 2018.2.16
  • Tableau Server on Linux 2018.3 through 2018.3.13
  • Tableau Server on Linux 2019.1 through 2019.1.11
  • Tableau Server on Linux 2019.2 through 2019.2.7
  • Tableau Server on Linux 2019.3 through 2019.3.3
  • Tableau Server on Linux 2019.4 through 2019.4.1

  • Tableau Server on Windows 10.4 through 10.4.22
  • Tableau Server on Windows 10.5 through 10.5.21
  • Tableau Server on Windows 2018.1 through 2018.1.18
  • Tableau Server on Windows 2018.2 through 2018.2.16
  • Tableau Server on Windows 2018.3 through 2018.3.13
  • Tableau Server on Windows 2019.1 through 2019.1.11
  • Tableau Server on Windows 2019.2 through 2019.2.7
  • Tableau Server on Windows 2019.3 through 2019.3.3
  • Tableau Server on Windows 2019.4 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 10.4.23
  • Tableau Server on Linux 10.5.22
  • Tableau Server on Linux 2018.1.19
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 10.4.23
  • Tableau Server on Windows 10.5.22
  • Tableau Server on Windows 2018.1.19
  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: High


Summary:

Tableau Server configured with an external Active Directory identity store can be forced to attempt to find users in a domain other than the one configured. An unauthenticated attacker can capture the Tableau Server Run As service account NTLMv1 password hash during this operation.


Impact:

The Run As service account password could be discovered by a brute-force attack of the NTLMv1 hash.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: High
CVSS3 Score: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - 7.5 High
Product Specific Notes: This only affects Tableau Servers configured to use an Active Directory identity store.

Vulnerable versions:

  • Tableau Server on Linux 10.5.0 through 10.5.22
  • Tableau Server on Linux 2018.1.0 through 2018.1.19
  • Tableau Server on Linux 2018.2.0 through 2018.2.16
  • Tableau Server on Linux 2018.3.0 through 2018.3.13
  • Tableau Server on Linux 2019.1.0 through 2019.1.11
  • Tableau Server on Linux 2019.2.0 through 2019.2.7
  • Tableau Server on Linux 2019.3.0 through 2019.3.3
  • Tableau Server on Linux 2019.4.0 through 2019.4.1

  • Tableau Server on Windows 10.4.0 through 10.4.23
  • Tableau Server on Windows 10.5.0 through 10.5.22
  • Tableau Server on Windows 2018.1.0 through 2018.1.19
  • Tableau Server on Windows 2018.2.0 through 2018.2.16
  • Tableau Server on Windows 2018.3.0 through 2018.3.13
  • Tableau Server on Windows 2019.1.0 through 2019.1.11
  • Tableau Server on Windows 2019.2.0 through 2019.2.7
  • Tableau Server on Windows 2019.3.0 through 2019.3.3
  • Tableau Server on Windows 2019.4.0 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 10.5.23
  • Tableau Server on Linux 2018.1.20
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 10.4.24
  • Tableau Server on Windows 10.5.23
  • Tableau Server on Windows 2018.1.20
  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Acknowledgement: This vulnerability was discovered by Jason Juntunen.

Highest overall severity: Medium


Summary:

An unspecified a JavaScript command lacks proper input validation that can result in files being written to an attacker-controlled location.


Impact:

Overwriting files may result in Tableau Server failing to operate.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H - 6.5 Medium
Product Specific Notes:

Vulnerable versions:

  • Tableau Server on Linux 2019.1 through 2019.1.11
  • Tableau Server on Linux 2019.2 through 2019.2.7
  • Tableau Server on Linux 2019.3 through 2019.3.3
  • Tableau Server on Linux 2019.4 through 2019.4.1

  • Tableau Server on Windows 2019.1 through 2019.1.11
  • Tableau Server on Windows 2019.2 through 2019.2.7
  • Tableau Server on Windows 2019.3 through 2019.3.3
  • Tableau Server on Windows 2019.4 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.

Highest overall severity: Medium


Summary:

Tableau Data Catalog metadata that includes specific embedded parameters and are published to Tableau Server may cause a XSS vulnerability in Tableau Server.


Impact:

When users open the Data Catalog tab in Tableau Server and click on embedded text, arbitrary Javascript may run in their browser session.


Products and Versions: Tableau Server | Tableau Desktop | Tableau Bridge | Tableau Prep | Tableau Reader | Tableau Mobile | Tableau Public Desktop
*Versions that are no longer supported are not tested and may be vulnerable.


Tableau Server

Severity: Medium
CVSS3 Score: AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N - 6.8 Medium
Product Specific Notes: None.

Vulnerable versions:

  • Tableau Server on Linux 10.5 through 10.5.22
  • Tableau Server on Linux 2018.1 through 2018.1.19
  • Tableau Server on Linux 2018.2 through 2018.2.16
  • Tableau Server on Linux 2018.3 through 2018.3.13
  • Tableau Server on Linux 2019.1 through 2019.1.11
  • Tableau Server on Linux 2019.2 through 2019.2.7
  • Tableau Server on Linux 2019.3 through 2019.3.3
  • Tableau Server on Linux 2019.4 through 2019.4.1

  • Tableau Server on Windows 10.4 through 10.4.23
  • Tableau Server on Windows 10.5 through 10.5.22
  • Tableau Server on Windows 2018.1 through 2018.1.19
  • Tableau Server on Windows 2018.2 through 2018.2.16
  • Tableau Server on Windows 2018.3 through 2018.3.13
  • Tableau Server on Windows 2019.1 through 2019.1.11
  • Tableau Server on Windows 2019.2 through 2019.2.7
  • Tableau Server on Windows 2019.3 through 2019.3.3
  • Tableau Server on Windows 2019.4 through 2019.4.1


Resolved in versions:

  • Tableau Server on Linux 10.5.23
  • Tableau Server on Linux 2018.1.20
  • Tableau Server on Linux 2018.2.17
  • Tableau Server on Linux 2018.3.14
  • Tableau Server on Linux 2019.1.12
  • Tableau Server on Linux 2019.2.8
  • Tableau Server on Linux 2019.3.4
  • Tableau Server on Linux 2019.4.2

  • Tableau Server on Windows 10.4.24
  • Tableau Server on Windows 10.5.23
  • Tableau Server on Windows 2018.1.20
  • Tableau Server on Windows 2018.2.17
  • Tableau Server on Windows 2018.3.14
  • Tableau Server on Windows 2019.1.12
  • Tableau Server on Windows 2019.2.8
  • Tableau Server on Windows 2019.3.4
  • Tableau Server on Windows 2019.4.2


Tableau Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Bridge (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Prep (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Reader (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Mobile (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.


Tableau Public Desktop (Back to top of page)

Severity: N/A
CVSS3 Score: N/A
Product Specific Notes: Not affected.