### [CVE-2021-36388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36388) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4". ### POC #### Reference - https://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities