Mfscripts

Yetishare

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 23.01.2026 16:47:42
  • Zuletzt bearbeitet 26.01.2026 15:03:33

YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoi...

  • EPSS 0.37%
  • Veröffentlicht 10.02.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:37:59

MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used).

Exploit
  • EPSS 1.46%
  • Veröffentlicht 10.02.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:37:59

payment_manage.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.4 directly insert values from the sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typical...

  • EPSS 0.47%
  • Veröffentlicht 10.02.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:37:59

MFScripts YetiShare v3.5.2 through v4.5.4 places sensitive information in the Referer header. If this leaks, then third parties may discover password-reset hashes, file-delete links, or other sensitive information.

  • EPSS 0.21%
  • Veröffentlicht 10.02.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:37:59

The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext. In other words, the user is not allowed to choose their own initial password.

  • EPSS 0.36%
  • Veröffentlicht 30.12.2019 18:15:16
  • Zuletzt bearbeitet 21.11.2024 04:35:25

_account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 takes a different amount of time to return depending on whether an email address is configured for the account name provided. This can be used by an attacker to enumerate ac...

  • EPSS 0.36%
  • Veröffentlicht 30.12.2019 18:15:16
  • Zuletzt bearbeitet 21.11.2024 04:35:25

_account_forgot_password.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 displays a message indicating whether an email address is configured for the account name provided. This can be used by an attacker to enumerate accounts by guessing email a...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 30.12.2019 17:15:20
  • Zuletzt bearbeitet 21.11.2024 04:35:16

_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the data...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 30.12.2019 17:15:20
  • Zuletzt bearbeitet 21.11.2024 04:35:16

class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing.

  • EPSS 0.28%
  • Veröffentlicht 30.12.2019 17:15:20
  • Zuletzt bearbeitet 21.11.2024 04:35:17

MFScripts YetiShare 3.5.2 through 4.5.3 does not set the HttpOnly flag on session cookies, allowing the cookie to be read by script, which can potentially be used by attackers to obtain the cookie via cross-site scripting.