5
CVSSv2

CVE-2021-36389

Published: 14/10/2021 Updated: 20/10/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

In Yellowfin prior to 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

yellowfinbi yellowfin

Exploits

Yellowfin versions prior to 961 suffer from persistent cross site scripting and insecure direct object reference vulnerabilities ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Yellowfin &lt; 961 Multiple Vulnerabilities <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: cyberaz0r v ...

Github Repositories

Advisory about multiple vulnerabilities discovered in Yellowfin before 9.6.1

Yellowfin &lt; 961 Multiple Vulnerabilities Table of contents: Stored Cross-Site Scripting in video embed functionality Insecure Direct Object Reference in MIAvatarImagei4 Insecure Direct Object Reference in MIImagei4 Vulnerability 1: Stored XSS Vulnerability Stored Cross-Site Scripting Affected Products and Versions Yellowfin &lt; 961 CVEID: CVE-2021-36387 CVSS