Insecure "unsafe-eval" directive in browser header for riskminder-client.js
search cancel

Insecure "unsafe-eval" directive in browser header for riskminder-client.js

book

Article ID: 260470

calendar_today

Updated On:

Products

CA Risk Authentication CA Advanced Authentication CA Advanced Authentication - Risk Authentication (RiskMinder / RiskFort)

Issue/Introduction

Insecure "unsafe-eval" directive used in browser header for riskminder-client.js is a client side issue if the riskminder-client.js uses eval() and Function().

The hotfix to address this issue exists and can be requested via a Broadcom support case. 

Refer to below document for more details:

Content Security Policy (CSP) - safe usage of unsafe-eval?

Essentially, usage of eval function and Function function is unsafe.

Such functions in any application allow any user to execute arbitrary code.

Environment

Release : 9.1.x

Component: CA Risk Authentication (formarly Risk Minder)

Cause

'unsafe-eval' directive when used allows the application to use the eval() and Function() JavaScript function.

This directive leads to reduced protection for riskminder-client.js against certain types of DOM-based XSS attacks. 

Resolution

Our recommendation is to use the latest version of riskminder-client.js from support portal under clients package to achieve a safer CSP (Content Safe Policy).

Additional Information

From product, we are not supporting CSP in AFM jsp pages.