In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4".
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Oct/15 | Third Party Advisory |
https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ | |
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md | Third Party Advisory |
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html | Third Party Advisory VDB Entry |
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-10-14T18:16:25
Updated: 2024-06-04T17:13:16.993Z
Reserved: 2021-07-12T00:00:00
Link: CVE-2021-36388
JSON object: View
NVD Information
Status : Modified
Published: 2021-10-14T19:15:09.223
Modified: 2024-05-14T20:15:12.353
Link: CVE-2021-36388
JSON object: View
Redhat Information
No data.
CWE