First published: Fri Mar 26 2021(Updated: )
Tableau Server fails to validate certain URLs that are embedded in emails sent to Tableau Server users.
Credit: security@salesforce.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tableau Server | >=2019.4<2019.4.18 | |
Tableau Server | >=2020.1<2020.1.15 | |
Tableau Server | >=2020.2<2020.2.12 | |
Tableau Server | >=2020.3<2020.3.7 | |
Tableau Server | >=2020.4<2020.4.3 | |
Microsoft Windows Operating System | ||
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1629 is a vulnerability in Tableau Server that allows attackers to perform open redirection attacks by tricking users into clicking on malicious links embedded in emails.
Tableau Server fails to validate certain URLs that are embedded in emails sent to Tableau Server users.
Versions 2019.4 to 2020.4 of Tableau Server are affected by CVE-2021-1629.
CVE-2021-1629 has a severity rating of medium (6.1) according to the National Vulnerability Database (NVD).
To fix CVE-2021-1629, Tableau Server users should update to a patched version provided by the vendor and ensure that URLs in emails are validated properly.