Vulnerability Description
YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://mfscripts.com
- https://www.exploit-db.com/exploits/49534
- https://www.vulncheck.com/advisories/yetishare-file-hosting-script-remote-file-u
- https://yetishare.com
- https://www.exploit-db.com/exploits/49534
FAQ
What is CVE-2021-47899?
CVE-2021-47899 is a vulnerability with a CVSS score of 4.0 (MEDIUM). YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit ...
How severe is CVE-2021-47899?
CVE-2021-47899 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47899?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.