mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
134 lines
5.1 KiB
JSON
134 lines
5.1 KiB
JSON
{
|
|
"id": "CVE-2022-22127",
|
|
"sourceIdentifier": "security@salesforce.com",
|
|
"published": "2022-05-25T14:15:08.637",
|
|
"lastModified": "2022-06-07T20:12:50.330",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Tableau es consciente de una vulnerabilidad de control de acceso rota presente en Tableau Server que afecta a clientes de Tableau Server que usan Local Identity Store para administrar usuarios. La vulnerabilidad permite que un administrador de sitio malicioso cambie las contrase\u00f1as de los usuarios en diferentes sitios alojados en el mismo Tableau Server, lo que puede resultar en un acceso no autorizado a los datos. Las versiones de Tableau Server afectadas son:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 y anteriores Nota: Todas las versiones futuras de Tableau Server abordar\u00e1n este problema de seguridad. Las versiones que ya no son compatibles no han sido probadas y pueden ser vulnerables"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.5
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2020.4",
|
|
"versionEndIncluding": "2020.4.16",
|
|
"matchCriteriaId": "35A3A2DC-A45A-4FF1-B149-507280EB80B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2021.1",
|
|
"versionEndIncluding": "2021.1.13",
|
|
"matchCriteriaId": "AD2F9200-3394-4AF5-ADBF-5248B81841C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2021.2",
|
|
"versionEndIncluding": "2021.2.10",
|
|
"matchCriteriaId": "68BB7CDF-7CA9-4CA2-9B53-C28D5B7F3AAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2021.3",
|
|
"versionEndIncluding": "2021.3.9",
|
|
"matchCriteriaId": "3A50A27D-6721-4456-A1F6-9CDCF92D1EA6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2021.4",
|
|
"versionEndIncluding": "2021.4.4",
|
|
"matchCriteriaId": "ADE492FF-CC59-4BC2-A29B-B2457DCF9F1F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://help.salesforce.com/s/articleView?id=000365493&type=1",
|
|
"source": "security@salesforce.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |