OSSIM Framework session/login.php dest Parameter XSS

This script is Copyright (C) 2008-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP application that is affected by a
cross-site scripting vulnerability.

Description :

The remote host is running OSSIM (Open Source Security Information
Management), a suite of security tools managed by a web-based
front-end.

The version of OSSIM installed on the remote host fails to sanitize
user input to the 'dest' parameter of the 'session/login.php' script
before using it to generate dynamic HTML output. An unauthenticated
attacker can exploit this to inject arbitrary HTML and script code
into a user's browser to be executed within the security context of
the affected site.

Note that there is also reportedly a SQL injection vulnerability
associated with this version of OSSIM, although Nessus has not checked
for it.

See also :

http://www.securityfocus.com/archive/1/488450/30/0/threaded
http://www.ossim.net/news.php#75

Solution :

Upgrade to OSSIM 0.9.9p1 / Installer 1.0.4 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 31133 ()

Bugtraq ID: 27929

CVE ID: CVE-2008-0919