In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4".Referenceshttp://packetstormsecurity.com/files/164515/Yellowfin-Cross-Site-Scripting-Insecure-Direct-Object-Reference.htmlhttps://wiki.yellowfinbi.com/display/yfcurrent/Release+Notes+for+Yellowfin+9#ReleaseNotesforYellowfin9-Yellowfin9.6https://github.com/cyberaz0r/Yellowfin-Multiple-Vulnerabilities/blob/main/README.mdhttp://seclists.org/fulldisclosure/2021/Oct/15https://cyberaz0r.info/2021/10/yellowfin-multiple-vulnerabilities/