In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html | vdb entry third party advisory |
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 | release notes vendor advisory |
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md | third party advisory |
http://seclists.org/fulldisclosure/2021/Oct/15 | third party advisory mailing list |
https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ |