How to Buy
This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote web server contains a CGI script that is susceptible to a
cross-site scripting attack.
The remote host is running Gossamer Links, a web links management tool
from Gossamer Threads and written in Perl.
The installed version of Gossamer Links fails to properly sanitize
user-supplied input to the 'url' parameter of the 'user.cgi' script.
By leveraging this flaw, an attacker may be able to cause arbitrary
HTML and script code to be executed by a user's browser within the
context of the affected application, leading to cookie theft and
See also :
Upgrade to Gossamer Links 3.0.1 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 4.3
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 19234 (gossamer_links_url_xss.nasl)
Bugtraq ID: 13484
CVE ID: CVE-2005-1492
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.