Description
In Yellowfin before 9.6.1 there is a Stored Cross-Site Scripting vulnerability in the video embed functionality exploitable through a specially crafted HTTP POST request to the page "ActivityStreamAjax.i4".
References (6)
Core 6
Core References
Third Party Advisory mailing-list
http://seclists.org/fulldisclosure/2021/Oct/15
Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
Third Party Advisory
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md
Third Party Advisory, VDB Entry
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
Release Notes, Vendor Advisory
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6
Scores
CVSS v3
5.4
EPSS
0.0308
EPSS Percentile
86.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-639
CWE-79
Status
published
Products (1)
yellowfinbi/yellowfin
< 9.6.1
Published
Oct 14, 2021
Tracked Since
Feb 18, 2026