Vulnerability CVE-2021-36388


Published: 2021-10-14

Description:
In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4".

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Yellowfin Cross Site Scripting / Insecure Direct Object Reference
Michele Di Bonav...
14.10.2021

Type:

CWE-639

(Authorization Bypass Through User-Controlled Key)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Yellowfinbi -> Yellowfin 

 References:
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
http://seclists.org/fulldisclosure/2021/Oct/15

Copyright 2024, cxsecurity.com

 

Back to Top