CVE-2021-36389

In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".
Configurations

Configuration 1 (hide)

cpe:2.3:a:yellowfinbi:yellowfin:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2021/Oct/15 - Third Party Advisory () http://seclists.org/fulldisclosure/2021/Oct/15 - Third Party Advisory
References () https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ - () https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ -
References () https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md - Third Party Advisory () https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md - Third Party Advisory
References () https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 - Release Notes, Vendor Advisory () https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 - Release Notes, Vendor Advisory

14 May 2024, 20:15

Type Values Removed Values Added
References
  • () https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ -

20 Oct 2021, 15:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-639
References (MISC) http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html - (MISC) http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html - Third Party Advisory, VDB Entry
References (MISC) https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md - (MISC) https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/15 - (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/15 - Third Party Advisory
References (MISC) https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 - (MISC) https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 - Release Notes, Vendor Advisory
CPE cpe:2.3:a:yellowfinbi:yellowfin:*:*:*:*:*:*:*:*

19 Oct 2021, 20:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/15 -

14 Oct 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-14 19:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36389

Mitre link : CVE-2021-36389

CVE.ORG link : CVE-2021-36389


JSON object : View

Products Affected

yellowfinbi

  • yellowfin
CWE
CWE-639

Authorization Bypass Through User-Controlled Key