Numerous Tableau products are vulnerable to XXE via a malicious workbook, extension, or data source, leading to information disclosure or a DoS. This affects Tableau Server, Tableau Desktop, Tableau Reader, and Tableau Public Desktop.
References
Link | Resource |
---|---|
https://community.tableau.com/community/security-bulletins/blog/2019/08/22/important-adv-2019-030-xxe-vulnerability-in-tableau-products | Vendor Advisory |
https://github.com/minecrater/exploits/blob/master/TableauXXE.py | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2019-08-26 10:15
Updated : 2022-04-18 09:11
NVD link : CVE-2019-15637
Mitre link : CVE-2019-15637
JSON object : View
CWE
CWE-611
Improper Restriction of XML External Entity Reference
Products Affected
microsoft
- windows
apple
- macos
tableau
- tableau_public_desktop
- tableau_desktop
- tableau_reader
- tableau_server
linux
- linux_kernel