OSSIM <= 0.9.9 RC5 Multiple Vulnerabilities

High Nessus Network Monitor Plugin ID 4398


The remote web server contains a PHP application that is affected by multiple flaws.


The remote host is running OSSIM (Open Source Security Information Management), a suite of security tools managed by a web-based front-end. The version of OSSIM installed on the remote host fails to sanitize user input to the 'dest' parameter of the 'session/login.php' script before using it to generate dynamic HTML output. An unauthenticated attacker can exploit this to inject arbitrary HTML and script code into a user's browser to be executed within the security context of the affected site. In addition, there is a SQL injection flaw within the 'modifyportform.php' script. An attacker exploiting this flaw would need the ability to authenticate to the application.


Upgrade or patch according to vendor recommendations.

See Also



Plugin Details

Severity: High

ID: 4398

Family: CGI

Published: 2008/02/22

Modified: 2018/09/16

Dependencies: 1442

Nessus ID: 31133

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:C


Base Score: 7.3

Temporal Score: 7.1


Temporal Vector: CVSS3#E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:open_source_security_information_management:os-sim

Reference Information

CVE: CVE-2008-0919, CVE-2008-0920

BID: 27927, 27929