In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4".
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 | release notes vendor advisory |
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html | vdb entry third party advisory |
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md | third party advisory |
http://seclists.org/fulldisclosure/2021/Oct/15 | third party advisory mailing list |
https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ |