We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".
Reserved 2021-07-12 | Published 2021-10-14 | Updated 2024-08-04 | Assigner mitrepacketstormsecurity.com/...cure-Direct-Object-Reference.html
wiki.yellowfinbi.com/...urrent/Release+Notes+for+Yellowfin+9
github.com/...n-Multiple-Vulnerabilities/blob/main/README.md
seclists.org/fulldisclosure/2021/Oct/15 (20211019 Yellowfin < 9.6.1 Multiple Vulnerabilities)
cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/
Support options