This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote web server hosts a PHP script that is prone to a cross-
site scripting attack.
The version of the Horde application framework hosted on the remote
web server fails to sanitize user input to the 'subdir' parameter of
the 'util/icon_browser.php' script before using it to generate dynamic
An attacker may be able to leverage this issue to inject arbitrary
HTML or script code into a user's browser to be executed within the
security context of the affected site.
See also :
Apply the patch in the GIT repository.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 49119 (horde_icon_browser_subdir_xss.nasl)
Bugtraq ID: 43001
CVE ID: CVE-2010-3077
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.