OSSIM Framework session/login.php dest Parameter XSS

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server contains a PHP application that is affected by a
cross-site scripting vulnerability.

Description :

The remote host is running OSSIM (Open Source Security Information
Management), a suite of security tools managed by a web-based

The version of OSSIM installed on the remote host fails to sanitize
user input to the 'dest' parameter of the 'session/login.php' script
before using it to generate dynamic HTML output. An unauthenticated
attacker can exploit this to inject arbitrary HTML and script code
into a user's browser to be executed within the security context of
the affected site.

Note that there is also reportedly a SQL injection vulnerability
associated with this version of OSSIM, although Nessus has not checked
for it.

See also :


Solution :

Upgrade to OSSIM 0.9.9p1 / Installer 1.0.4 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.4
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 31133 ()

Bugtraq ID: 27929

CVE ID: CVE-2008-0919

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now