Numerous Tableau products are vulnerable to XXE via a malicious workbook, extension, or data source, leading to information disclosure or a DoS. This affects Tableau Server, Tableau Desktop, Tableau Reader, and Tableau Public Desktop.
References
Link | Resource |
---|---|
https://community.tableau.com/community/security-bulletins/blog/2019/08/22/important-adv-2019-030-xxe-vulnerability-in-tableau-products | Vendor Advisory |
https://github.com/minecrater/exploits/blob/master/TableauXXE.py | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
08 Sep 2021, 17:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
Information
Published : 2019-08-26 17:15
Updated : 2024-02-04 20:20
NVD link : CVE-2019-15637
Mitre link : CVE-2019-15637
CVE.ORG link : CVE-2019-15637
JSON object : View
Products Affected
apple
- macos
microsoft
- windows
tableau
- tableau_public_desktop
- tableau_reader
- tableau_server
- tableau_desktop
linux
- linux_kernel
CWE
CWE-611
Improper Restriction of XML External Entity Reference