FKIE_CVE-2022-22127

Vulnerability from fkie_nvd - Published: 2022-05-25 14:15 - Updated: 2024-11-21 06:46
Summary
Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35A3A2DC-A45A-4FF1-B149-507280EB80B3",
              "versionEndIncluding": "2020.4.16",
              "versionStartIncluding": "2020.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2F9200-3394-4AF5-ADBF-5248B81841C4",
              "versionEndIncluding": "2021.1.13",
              "versionStartIncluding": "2021.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68BB7CDF-7CA9-4CA2-9B53-C28D5B7F3AAC",
              "versionEndIncluding": "2021.2.10",
              "versionStartIncluding": "2021.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A50A27D-6721-4456-A1F6-9CDCF92D1EA6",
              "versionEndIncluding": "2021.3.9",
              "versionStartIncluding": "2021.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE492FF-CC59-4BC2-A29B-B2457DCF9F1F",
              "versionEndIncluding": "2021.4.4",
              "versionStartIncluding": "2021.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable."
    },
    {
      "lang": "es",
      "value": "Tableau es consciente de una vulnerabilidad de control de acceso rota presente en Tableau Server que afecta a clientes de Tableau Server que usan Local Identity Store para administrar usuarios. La vulnerabilidad permite que un administrador de sitio malicioso cambie las contrase\u00f1as de los usuarios en diferentes sitios alojados en el mismo Tableau Server, lo que puede resultar en un acceso no autorizado a los datos. Las versiones de Tableau Server afectadas son:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 y anteriores Nota: Todas las versiones futuras de Tableau Server abordar\u00e1n este problema de seguridad. Las versiones que ya no son compatibles no han sido probadas y pueden ser vulnerables"
    }
  ],
  "id": "CVE-2022-22127",
  "lastModified": "2024-11-21T06:46:13.980",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-25T14:15:08.637",
  "references": [
    {
      "source": "security@salesforce.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://help.salesforce.com/s/articleView?id=000365493\u0026type=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://help.salesforce.com/s/articleView?id=000365493\u0026type=1"
    }
  ],
  "sourceIdentifier": "security@salesforce.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…