YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol. | |
| Title | YetiShare File Hosting Script 5.1.0 Remote File Upload SSRF Vulnerability | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-23T16:47:42.136Z
Reserved: 2026-01-18T12:35:05.176Z
Link: CVE-2021-47899
No data.
Status : Received
Published: 2026-01-23T17:16:02.120
Modified: 2026-01-23T17:16:02.120
Link: CVE-2021-47899
No data.
OpenCVE Enrichment
No data.