Product release and download

Tableau Server 8.1.2

We recommend using the newest maintenance release of this version, 8.1.25, which contains additional fixes.

Download Tableau Server 8.1.25

Build number


Download Tableau Server 8.1.2

Release date

Sun, December 22, 2013

Product support

Read more

Installation Guide
Install and Configure Tableau Server

Planning to upgrade?
Tableau Server Upgrade Page

This release is an important update to address the following product issues in Tableau 8.1 and 8.1.1. All Salesforce extracts that were created in 8.0, 8.1, or 8.1.1 or were upgraded to these versions may contain corrupt or inaccurate data. Refreshing the extracts using Tableau 8.1.2 corrects the issue. Scheduled and manual refreshes will be forced to become a full refresh initially. Subsequent refreshes will return to incremental as originally specified. In Tableau Desktop, you will be prompted to refresh Salesforce extracts before continuing to use the workbook. Make sure to save the workbook to ensure correct data when the workbook is opened again later. On Tableau Server, original views will remain available with inaccurate data until the extracts are refreshed.

Resolved Issues

Issue ID Description

Resolved a privately reported blind SQL injection vulnerability in Tableau Server. The vulnerability could have allowed arbitrary SQL commands to be passed to the Tableau Server backend database for execution. An attacker who successfully exploited the vulnerability could have taken complete control of an instance of Tableau Server. An attacker would have needed valid credentials or the guest account would have had to have been enabled to exploit this vulnerability. This vulnerability is rated Critical for 8.0.x and 8.1.x versions of Tableau Server, and customers are urged to upgrade at their earliest opportunity. Tableau has not received any information to indicate that this vulnerability has been publicly used to attack customers at the time this update was released. Tableau would like to thank Tanya Secker and Christiaan Esterhuizen of Trustwave SpiderLabs for identifying and reporting this issue (CVE-2014-1204) and for working with us to help protect our customers.

Download Files