Search criteria

12 vulnerabilities found for DevExpress by DevExpress

CVE-2023-35817 (GCVE-0-2023-35817)

Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:03
VLAI?
Summary
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Unaffected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35817",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T18:02:56.672870Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T18:03:18.175Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "unaffected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 allows AsyncDownloader SSRF."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T16:12:35.996Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1161404/report-and-dashboard-server-improper-default-configuration-can-lead-to-ssrf-attacks"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1162045/reporting-bi-dashboard-office-file-api-web-app-configuration-to-help-prevent-ssrf-attacks"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1157209/server-side-request-forgery-via-asyncdownloader"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35817",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T18:03:18.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35816 (GCVE-0-2023-35816)

Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 allows arbitrary TypeConverter conversion.
CWE
  • CWE-23 - Relative Path Traversal
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Affected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35816",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T18:08:00.826540Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T18:08:07.672Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "affected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "21.2.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.7",
                  "versionStartIncluding": "22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.9",
                  "versionStartIncluding": "22.1.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.3",
                  "versionStartIncluding": "22.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.6",
                  "versionStartIncluding": "22.2.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "23.1.3",
                  "versionStartIncluding": "23",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 allows arbitrary TypeConverter conversion."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23 Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T16:12:05.415Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1159641/net-desktop-and-web-controls-unsafe-data-type-deserialization"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1127422/insecure-arbitrary-typeconverter-conversion"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35816",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T18:08:07.672Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35815 (GCVE-0-2023-35815)

Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Affected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T18:08:24.167602Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T18:08:30.889Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "affected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "21.2.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.7",
                  "versionStartIncluding": "22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.9",
                  "versionStartIncluding": "22.1.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.3",
                  "versionStartIncluding": "22.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.6",
                  "versionStartIncluding": "22.2.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "23.1.3",
                  "versionStartIncluding": "23",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T16:11:40.586Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1159142/web-reporting-data-source-protection-bypassed-during-xml-deserialization"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1141947/data-source-protection-bypass-during-xml-deserialization"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35815",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T18:08:30.889Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35814 (GCVE-0-2023-35814)

Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 15:56
VLAI?
Summary
DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Affected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35814",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T15:55:54.213286Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T15:56:00.337Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "affected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "21.2.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.7",
                  "versionStartIncluding": "22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.9",
                  "versionStartIncluding": "22.1.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.3",
                  "versionStartIncluding": "22.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.6",
                  "versionStartIncluding": "22.2.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "23.1.3",
                  "versionStartIncluding": "23",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T15:54:16.095Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1141158/missing-protection-of-xtrareport-serialized-data-in-asp-net-web-forms"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1160535/web-reporting-well-formed-request-to-a-report-control-s-backend-can-use"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1158413/the-allowpassingdatasourceconnectionparameterstoclient-method-may-allow-untrusted-access"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35814",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T15:56:00.337Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-28684 (GCVE-0-2022-28684)

Vulnerability from nvd – Published: 2022-08-03 15:20 – Updated: 2024-08-03 06:03
VLAI?
Summary
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
zdi
References
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 20.21.01.102
Create a notification for this product.
Credits
Markus Wulftange (@mwulftange)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:03:52.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "status": "affected",
              "version": "20.21.01.102"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Markus Wulftange (@mwulftange)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-03T15:20:46",
        "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
        "shortName": "zdi"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "zdi-disclosures@trendmicro.com",
          "ID": "CVE-2022-28684",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "DevExpress",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "20.21.01.102"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "DevExpress"
              }
            ]
          }
        },
        "credit": "Markus Wulftange (@mwulftange)",
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-502: Deserialization of Untrusted Data"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
    "assignerShortName": "zdi",
    "cveId": "CVE-2022-28684",
    "datePublished": "2022-08-03T15:20:46",
    "dateReserved": "2022-04-05T00:00:00",
    "dateUpdated": "2024-08-03T06:03:52.478Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-36483 (GCVE-0-2021-36483)

Vulnerability from nvd – Published: 2021-08-04 10:04 – Updated: 2024-08-04 00:54
VLAI?
Summary
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:54:51.443Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-15T15:06:19",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-36483",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e",
              "refsource": "MISC",
              "url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
            },
            {
              "name": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization",
              "refsource": "MISC",
              "url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
            },
            {
              "name": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization",
              "refsource": "MISC",
              "url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
            },
            {
              "name": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f",
              "refsource": "MISC",
              "url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
            },
            {
              "name": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization",
              "refsource": "CONFIRM",
              "url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-36483",
    "datePublished": "2021-08-04T10:04:29",
    "dateReserved": "2021-07-12T00:00:00",
    "dateUpdated": "2024-08-04T00:54:51.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35815 (GCVE-0-2023-35815)

Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Affected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T18:08:24.167602Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T18:08:30.889Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "affected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "21.2.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.7",
                  "versionStartIncluding": "22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.9",
                  "versionStartIncluding": "22.1.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.3",
                  "versionStartIncluding": "22.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.6",
                  "versionStartIncluding": "22.2.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "23.1.3",
                  "versionStartIncluding": "23",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T16:11:40.586Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1159142/web-reporting-data-source-protection-bypassed-during-xml-deserialization"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1141947/data-source-protection-bypass-during-xml-deserialization"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35815",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T18:08:30.889Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35814 (GCVE-0-2023-35814)

Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 15:56
VLAI?
Summary
DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Affected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35814",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T15:55:54.213286Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T15:56:00.337Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "affected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "21.2.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.7",
                  "versionStartIncluding": "22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.9",
                  "versionStartIncluding": "22.1.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.3",
                  "versionStartIncluding": "22.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.6",
                  "versionStartIncluding": "22.2.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "23.1.3",
                  "versionStartIncluding": "23",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T15:54:16.095Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1141158/missing-protection-of-xtrareport-serialized-data-in-asp-net-web-forms"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1160535/web-reporting-well-formed-request-to-a-report-control-s-backend-can-use"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1158413/the-allowpassingdatasourceconnectionparameterstoclient-method-may-allow-untrusted-access"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35814",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T15:56:00.337Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35817 (GCVE-0-2023-35817)

Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:03
VLAI?
Summary
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Unaffected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35817",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T18:02:56.672870Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T18:03:18.175Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "unaffected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 allows AsyncDownloader SSRF."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T16:12:35.996Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1161404/report-and-dashboard-server-improper-default-configuration-can-lead-to-ssrf-attacks"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1162045/reporting-bi-dashboard-office-file-api-web-app-configuration-to-help-prevent-ssrf-attacks"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1157209/server-side-request-forgery-via-asyncdownloader"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35817",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T18:03:18.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-35816 (GCVE-0-2023-35816)

Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 allows arbitrary TypeConverter conversion.
CWE
  • CWE-23 - Relative Path Traversal
Assigner
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 0 , < 21.2.12 (custom)
Affected: 22 , < 22.1.7 (custom)
Affected: 22.1.8 , < 22.1.9 (custom)
Affected: 22.2 , < 22.2.3 (custom)
Affected: 22.2.4 , < 22.2.6 (custom)
Affected: 23 , < 23.1.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-35816",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-28T18:08:00.826540Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-28T18:08:07.672Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "lessThan": "21.2.12",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.7",
              "status": "affected",
              "version": "22",
              "versionType": "custom"
            },
            {
              "lessThan": "22.1.9",
              "status": "affected",
              "version": "22.1.8",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.3",
              "status": "affected",
              "version": "22.2",
              "versionType": "custom"
            },
            {
              "lessThan": "22.2.6",
              "status": "affected",
              "version": "22.2.4",
              "versionType": "custom"
            },
            {
              "lessThan": "23.1.3",
              "status": "affected",
              "version": "23",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "21.2.12",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.7",
                  "versionStartIncluding": "22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.1.9",
                  "versionStartIncluding": "22.1.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.3",
                  "versionStartIncluding": "22.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "22.2.6",
                  "versionStartIncluding": "22.2.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "23.1.3",
                  "versionStartIncluding": "23",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress before 23.1.3 allows arbitrary TypeConverter conversion."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23 Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-28T16:12:05.415Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1159641/net-desktop-and-web-controls-unsafe-data-type-deserialization"
        },
        {
          "url": "https://code-white.com/public-vulnerability-list/"
        },
        {
          "url": "https://supportcenter.devexpress.com/ticket/details/t1127422/insecure-arbitrary-typeconverter-conversion"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-35816",
    "datePublished": "2025-04-28T00:00:00.000Z",
    "dateReserved": "2023-06-17T00:00:00.000Z",
    "dateUpdated": "2025-04-28T18:08:07.672Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-28684 (GCVE-0-2022-28684)

Vulnerability from cvelistv5 – Published: 2022-08-03 15:20 – Updated: 2024-08-03 06:03
VLAI?
Summary
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
zdi
References
Impacted products
Vendor Product Version
DevExpress DevExpress Affected: 20.21.01.102
Create a notification for this product.
Credits
Markus Wulftange (@mwulftange)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:03:52.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "DevExpress",
          "vendor": "DevExpress",
          "versions": [
            {
              "status": "affected",
              "version": "20.21.01.102"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Markus Wulftange (@mwulftange)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-03T15:20:46",
        "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
        "shortName": "zdi"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "zdi-disclosures@trendmicro.com",
          "ID": "CVE-2022-28684",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "DevExpress",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "20.21.01.102"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "DevExpress"
              }
            ]
          }
        },
        "credit": "Markus Wulftange (@mwulftange)",
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-502: Deserialization of Untrusted Data"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
    "assignerShortName": "zdi",
    "cveId": "CVE-2022-28684",
    "datePublished": "2022-08-03T15:20:46",
    "dateReserved": "2022-04-05T00:00:00",
    "dateUpdated": "2024-08-03T06:03:52.478Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-36483 (GCVE-0-2021-36483)

Vulnerability from cvelistv5 – Published: 2021-08-04 10:04 – Updated: 2024-08-04 00:54
VLAI?
Summary
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:54:51.443Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-15T15:06:19",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-36483",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e",
              "refsource": "MISC",
              "url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
            },
            {
              "name": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization",
              "refsource": "MISC",
              "url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
            },
            {
              "name": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization",
              "refsource": "MISC",
              "url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
            },
            {
              "name": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f",
              "refsource": "MISC",
              "url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
            },
            {
              "name": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization",
              "refsource": "CONFIRM",
              "url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-36483",
    "datePublished": "2021-08-04T10:04:29",
    "dateReserved": "2021-07-12T00:00:00",
    "dateUpdated": "2024-08-04T00:54:51.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}