Hi,
I'd like to inform you about a XSS-vulnerability in Adobe RoboHelp 6, RoboHelp Server 6 and RoboHelp X5. See attached advisory below.
I - TITLE
Security advisory: Cross-Site Scripting in RoboHelp 6, RoboHelp Server 6
and RoboHelp X5
II - SUMMARY
Description: A Cross-Site Scripting Flaw in generated RoboHelp webpages allows
an attacker to redirect users to arbitrary sites.
Author: Michael Domberg (mdomberg at gmx dot li)
Date: May 8th 2007
Severity: Medium
References: http://www.devtarget.org/adobe-advisory-05-2007.txt
III - OVERVIEW
Adobe RoboHelp 6 is a complete, flexible, and user-friendly system for building, managing, and publishing engaging content for help systems and standalone knowledge bases. It is a core product in the Adobe portfolio for technical communicators.
Adobe RoboHelp Server 6 extends and supports the capabilities of Adobe RoboHelp 6 to provide a complete online help and knowledge base solution. Easily deploy and manage up-to-date online content, control and monitor the use of web-based help systems in real time, and develop help systems for use with the Microsoft .NET Framework.
More information about the product can be found online at
http://www.adobe.com/products/robohelp/
http://www.adobe.com/products/robohelpserver/
IV - DETAILS
The RoboHelp compiler generates a bunch of .html-files. The URL to
the generated content looks like:
http://server/project_name/en/frameset-7.html#main_content.html
where
..server ist the name of the webserver
..project_name is a freely choosable name of the help project
..en is the shortname of the generated language
..frameset-7.html is the name of the file which contains the
frameset of the help system
..main_content.html is the name of the page that should be
displayed within the main frame
The JavaScript parts of "frameset-7.html" analyze the parameters
behind the "#"-sign and load the specified page into the main frame.
The script fails to sanitize the parameter so any URL could be specified
to be loaded into the frame. An malicious user might use URLs like:
http://server/project_name/en/frameset-7.html#http://evil.com/cookiethief
The parameter could be encoded with Unicode to hide the the real location
of the page. Users that are tricked into clicking on such malicious links
might be led to pages that fit into the "look-and-feel" of the original
page and that query for credentials.
V - ANALYSIS
The severity of this vulnerability is to be considered "low". An attacker
has to trick a victim into clicking the malicious URL and entering confidential
data on that site. Another possible attack is to get the victim's cookies.
Due to the fact that the vulnerability affects a development tool there may be
other websites and software products that indirectly affected by this flaw.
VI - EXPLOIT CODE
There is no code needed to exploit this vulnerability. It can simply
be exploited by entering a specially crafted URL into a browser.
VII - WORKAROUND/FIX
The vendor addressed the vulnerability by publishing patches for each affected
product. After downloading the patches, the following actions have to be taken:
- apply the patch
- restart RoboHelp / RoboHelp Server
- re-generate all content
- replace the old (vulnerable) content with the recently generated one.
VIII - DISCLOSURE TIMELINE
14. January 2007 - Notified vendor of affected software
26. January 2007 - Vulnerability confirmed
08. May 2007 - Release of patch
08. May 2007 - Public disclosure
Regards,
Michael Domberg,
www.devtarget.org
{"id": "SECURITYVULNS:DOC:17009", "bulletinFamily": "software", "title": "Cross-Site Scripting in Adobe RoboHelp 6, Server 6 and X5", "description": "Hi,\r\nI'd like to inform you about a XSS-vulnerability in Adobe RoboHelp 6, RoboHelp Server 6 and RoboHelp X5. See attached advisory below.\r\n\r\n\r\nI - TITLE\r\n\r\nSecurity advisory: Cross-Site Scripting in RoboHelp 6, RoboHelp Server 6 \r\n and RoboHelp X5\r\n\r\nII - SUMMARY\r\n\r\nDescription: A Cross-Site Scripting Flaw in generated RoboHelp webpages allows\r\n an attacker to redirect users to arbitrary sites.\r\n\r\nAuthor: Michael Domberg (mdomberg at gmx dot li)\r\n\r\nDate: May 8th 2007\r\n\r\nSeverity: Medium\r\n\r\nReferences: http://www.devtarget.org/adobe-advisory-05-2007.txt\r\n\r\nIII - OVERVIEW\r\n\r\nAdobe RoboHelp 6 is a complete, flexible, and user-friendly system for building, managing, and publishing engaging content for help systems and standalone knowledge bases. It is a core product in the Adobe portfolio for technical communicators.\r\n\r\nAdobe RoboHelp Server 6 extends and supports the capabilities of Adobe RoboHelp 6 to provide a complete online help and knowledge base solution. Easily deploy and manage up-to-date online content, control and monitor the use of web-based help systems in real time, and develop help systems for use with the Microsoft .NET Framework.\r\n\r\nMore information about the product can be found online at\r\nhttp://www.adobe.com/products/robohelp/\r\nhttp://www.adobe.com/products/robohelpserver/\r\n\r\nIV - DETAILS\r\n\r\nThe RoboHelp compiler generates a bunch of .html-files. The URL to \r\nthe generated content looks like:\r\n\r\nhttp://server/project_name/en/frameset-7.html#main_content.html\r\n\r\nwhere\r\n..server ist the name of the webserver\r\n..project_name is a freely choosable name of the help project\r\n..en is the shortname of the generated language\r\n..frameset-7.html is the name of the file which contains the \r\n frameset of the help system\r\n..main_content.html is the name of the page that should be \r\n displayed within the main frame\r\n\r\nThe JavaScript parts of "frameset-7.html" analyze the parameters \r\nbehind the "#"-sign and load the specified page into the main frame.\r\nThe script fails to sanitize the parameter so any URL could be specified\r\nto be loaded into the frame. An malicious user might use URLs like:\r\n\r\nhttp://server/project_name/en/frameset-7.html#http://evil.com/cookiethief\r\n\r\nThe parameter could be encoded with Unicode to hide the the real location\r\nof the page. Users that are tricked into clicking on such malicious links\r\nmight be led to pages that fit into the "look-and-feel" of the original\r\npage and that query for credentials.\r\n\r\nV - ANALYSIS\r\n\r\nThe severity of this vulnerability is to be considered "low". An attacker\r\nhas to trick a victim into clicking the malicious URL and entering confidential\r\ndata on that site. Another possible attack is to get the victim's cookies.\r\n\r\nDue to the fact that the vulnerability affects a development tool there may be\r\nother websites and software products that indirectly affected by this flaw.\r\n\r\nVI - EXPLOIT CODE\r\n\r\nThere is no code needed to exploit this vulnerability. It can simply\r\nbe exploited by entering a specially crafted URL into a browser.\r\n\r\nVII - WORKAROUND/FIX\r\n\r\nThe vendor addressed the vulnerability by publishing patches for each affected\r\nproduct. After downloading the patches, the following actions have to be taken:\r\n- apply the patch\r\n- restart RoboHelp / RoboHelp Server\r\n- re-generate all content\r\n- replace the old (vulnerable) content with the recently generated one.\r\n\r\nVIII - DISCLOSURE TIMELINE\r\n\r\n14. January 2007 - Notified vendor of affected software\r\n26. January 2007 - Vulnerability confirmed\r\n08. May 2007 - Release of patch\r\n08. May 2007 - Public disclosure \r\n\r\nRegards,\r\nMichael Domberg,\r\nwww.devtarget.org\r\n\r\n", "published": "2007-05-14T00:00:00", "modified": "2007-05-14T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:17009", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:22", "edition": 1, "viewCount": 55, "enchantments": {"score": {"value": -0.3, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7709"]}], "rev": 4}, "backreferences": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7709"]}, {"type": "vulnerlab", "idList": ["VULNERABLE:41"]}]}, "exploitation": null, "vulnersScore": -0.3}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645493658, "score": 1659803227}, "_internal": {"score_hash": "c500798435a90ac8c1980006893d7aba"}}