This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote web server contains a PHP application that is affected by a
cross-site scripting vulnerability.
The remote host is running OSSIM (Open Source Security Information
Management), a suite of security tools managed by a web-based
The version of OSSIM installed on the remote host fails to sanitize
user input to the 'dest' parameter of the 'session/login.php' script
before using it to generate dynamic HTML output. An unauthenticated
attacker can exploit this to inject arbitrary HTML and script code
into a user's browser to be executed within the security context of
the affected site.
Note that there is also reportedly a SQL injection vulnerability
associated with this version of OSSIM, although Nessus has not checked
See also :
Upgrade to OSSIM 0.9.9p1 / Installer 1.0.4 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.4
Public Exploit Available : true