In Yellowfin before 9.6.1 there is a Stored Cross-Site Scripting vulnerability in the video embed functionality exploitable through a specially crafted HTTP POST request to the page "ActivityStreamAjax.i4".
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Oct/15 | Third Party Advisory |
https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/ | |
https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md | Third Party Advisory |
https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html | Third Party Advisory VDB Entry |
https://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6 | Release Notes Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-10-14 19:15
Updated : 2024-07-03 01:36
NVD link : CVE-2021-36387
Mitre link : CVE-2021-36387
CVE.ORG link : CVE-2021-36387
JSON object : View
Products Affected
yellowfinbi
- yellowfin