This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote web server contains a PHP script that is vulnerable to a
reflected cross-site scripting attack.
The version of phpLDAPadmin on the remote host fails to properly
sanitize the base parameter of 'lib/QueryRender.php' script before
using it to generate dynamic HTML.
By tricking someone into clicking on a specially crafted link, an
attacker may be able exploit this to inject arbitrary HTML and script
code in a user's browser to be executed within the security context of
the affected site.
See also :
Grab the latest copy of 'lib/QueryRender.php' from the phpLDAPadmin
GIT repository or patch the file manually.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true