Client DOM Open Redirect vulnerabilities in RH 2022.6.34 WebHelp and HTML5 Outputs
Checkmarx has identified "Client DOM Open Redirect" vulnerabilities in the help output generated by the latest version of RoboHelp, in three RH-created JavaScript files (topicwidgets.min.js, csh-core.min.js, and rh.min.js). These are classified as Medium OWASP vulnerabilities and my company security policy will no longer allow us to distribute software with these.
Here is a sample from my security report:
"The potentially tainted value provided by href
in [PATH EDITED OUT FOR PRIVACY]/WebHelp/template/scripts/topicwidgets.min.js at line 1237 is used as a destination URL by location in [PATH EDITED OUT FOR PRIVACY]
/WebHelp/template/scripts/topicwidgets.min.js at line 1241, potentially allowing attackers to perform an open redirection."
These issues have been around for quite some time. I recently upgraded from RH 2015, hoping the most recent release would clear the issue, but it has not.
Our developers are not allowed to edit files from an outside vendor, and, even if we could get an exception for this, I believe they would need to do so every time the file is generated by RH.
Can someone from Adobe please look at changing these files to ensure they do not contain vulnerabilities?
Thank you.
