Vulnerability CVE-2021-36387


Published: 2021-10-14

Description:
In Yellowfin before 9.6.1 there is a Stored Cross-Site Scripting vulnerability in the video embed functionality exploitable through a specially crafted HTTP POST request to the page "ActivityStreamAjax.i4".

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Yellowfin Cross Site Scripting / Insecure Direct Object Reference
Michele Di Bonav...
14.10.2021

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.5/10
2.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Yellowfinbi -> Yellowfin 

 References:
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
http://seclists.org/fulldisclosure/2021/Oct/15

Copyright 2024, cxsecurity.com

 

Back to Top