Description
In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4".
References (5)
Core 5
Core References
Third Party Advisory mailing-list
http://seclists.org/fulldisclosure/2021/Oct/15
Third Party Advisory
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md
Third Party Advisory, VDB Entry
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html
Release Notes, Vendor Advisory
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6
Scores
CVSS v3
7.5
EPSS
0.0161
EPSS Percentile
81.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-639
Status
published
Products (1)
yellowfinbi/yellowfin
< 9.6.1
Published
Oct 14, 2021
Tracked Since
Feb 18, 2026