First published: Thu Oct 14 2021(Updated: )
In Yellowfin before 9.6.1 there is a Stored Cross-Site Scripting vulnerability in the video embed functionality exploitable through a specially crafted HTTP POST request to the page "ActivityStreamAjax.i4".
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yellowfinbi Yellowfin | <9.6.1 | |
<9.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36387.
The severity of CVE-2021-36387 is medium, with a severity value of 5.4.
The Stored Cross-Site Scripting vulnerability in Yellowfin before 9.6.1 can be exploited through a specially crafted HTTP POST request to the page 'ActivityStreamAjax.i4'.
The vulnerability affects users of Yellowfin versions up to and excluding 9.6.1.
Yes, there are references related to CVE-2021-36387. You can find them at the following URLs: http://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html, http://seclists.org/fulldisclosure/2021/Oct/15, and https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.md.