In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".
References
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2021/Oct/15 - Third Party Advisory | |
References | () https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ - | |
References | () https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md - Third Party Advisory | |
References | () https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 - Release Notes, Vendor Advisory |
14 May 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-10-14 19:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36389
Mitre link : CVE-2021-36389
CVE.ORG link : CVE-2021-36389
JSON object : View
Products Affected
yellowfinbi
- yellowfin
CWE
CWE-639
Authorization Bypass Through User-Controlled Key