Search criteria
12 vulnerabilities found for devexpress by devexpress
CVE-2023-35817 (GCVE-0-2023-35817)
Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:03
VLAI?
Summary
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
Severity ?
5 (Medium)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Unaffected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35817",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T18:02:56.672870Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T18:03:18.175Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "unaffected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 allows AsyncDownloader SSRF."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918 Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T16:12:35.996Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1161404/report-and-dashboard-server-improper-default-configuration-can-lead-to-ssrf-attacks"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1162045/reporting-bi-dashboard-office-file-api-web-app-configuration-to-help-prevent-ssrf-attacks"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1157209/server-side-request-forgery-via-asyncdownloader"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35817",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T18:03:18.175Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35816 (GCVE-0-2023-35816)
Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 allows arbitrary TypeConverter conversion.
Severity ?
CWE
- CWE-23 - Relative Path Traversal
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Affected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35816",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T18:08:00.826540Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T18:08:07.672Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "affected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.2.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.7",
"versionStartIncluding": "22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.9",
"versionStartIncluding": "22.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.3",
"versionStartIncluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.6",
"versionStartIncluding": "22.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"versionStartIncluding": "23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 allows arbitrary TypeConverter conversion."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-23",
"description": "CWE-23 Relative Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T16:12:05.415Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1159641/net-desktop-and-web-controls-unsafe-data-type-deserialization"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1127422/insecure-arbitrary-typeconverter-conversion"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35816",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T18:08:07.672Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35815 (GCVE-0-2023-35815)
Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data.
Severity ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Affected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35815",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T18:08:24.167602Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T18:08:30.889Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "affected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.2.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.7",
"versionStartIncluding": "22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.9",
"versionStartIncluding": "22.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.3",
"versionStartIncluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.6",
"versionStartIncluding": "22.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"versionStartIncluding": "23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T16:11:40.586Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1159142/web-reporting-data-source-protection-bypassed-during-xml-deserialization"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1141947/data-source-protection-bypass-during-xml-deserialization"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35815",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T18:08:30.889Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35814 (GCVE-0-2023-35814)
Vulnerability from nvd – Published: 2025-04-28 00:00 – Updated: 2025-04-28 15:56
VLAI?
Summary
DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms.
Severity ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Affected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35814",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T15:55:54.213286Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T15:56:00.337Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "affected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.2.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.7",
"versionStartIncluding": "22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.9",
"versionStartIncluding": "22.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.3",
"versionStartIncluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.6",
"versionStartIncluding": "22.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"versionStartIncluding": "23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T15:54:16.095Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1141158/missing-protection-of-xtrareport-serialized-data-in-asp-net-web-forms"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1160535/web-reporting-well-formed-request-to-a-report-control-s-backend-can-use"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1158413/the-allowpassingdatasourceconnectionparameterstoclient-method-may-allow-untrusted-access"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35814",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T15:56:00.337Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-28684 (GCVE-0-2022-28684)
Vulnerability from nvd – Published: 2022-08-03 15:20 – Updated: 2024-08-03 06:03
VLAI?
Summary
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710.
Severity ?
8.8 (High)
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
20.21.01.102
|
Credits
Markus Wulftange (@mwulftange)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:03:52.478Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"status": "affected",
"version": "20.21.01.102"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Markus Wulftange (@mwulftange)"
}
],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502: Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-03T15:20:46",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "zdi-disclosures@trendmicro.com",
"ID": "CVE-2022-28684",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "DevExpress",
"version": {
"version_data": [
{
"version_value": "20.21.01.102"
}
]
}
}
]
},
"vendor_name": "DevExpress"
}
]
}
},
"credit": "Markus Wulftange (@mwulftange)",
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
}
]
},
"impact": {
"cvss": {
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502: Deserialization of Untrusted Data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2022-28684",
"datePublished": "2022-08-03T15:20:46",
"dateReserved": "2022-04-05T00:00:00",
"dateUpdated": "2024-08-03T06:03:52.478Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-36483 (GCVE-0-2021-36483)
Vulnerability from nvd – Published: 2021-08-04 10:04 – Updated: 2024-08-04 00:54
VLAI?
Summary
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:54:51.443Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-15T15:06:19",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-36483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e",
"refsource": "MISC",
"url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
},
{
"name": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization",
"refsource": "MISC",
"url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
},
{
"name": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization",
"refsource": "MISC",
"url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
},
{
"name": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f",
"refsource": "MISC",
"url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
},
{
"name": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization",
"refsource": "CONFIRM",
"url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-36483",
"datePublished": "2021-08-04T10:04:29",
"dateReserved": "2021-07-12T00:00:00",
"dateUpdated": "2024-08-04T00:54:51.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35815 (GCVE-0-2023-35815)
Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data.
Severity ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Affected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35815",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T18:08:24.167602Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T18:08:30.889Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "affected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.2.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.7",
"versionStartIncluding": "22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.9",
"versionStartIncluding": "22.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.3",
"versionStartIncluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.6",
"versionStartIncluding": "22.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"versionStartIncluding": "23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T16:11:40.586Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1159142/web-reporting-data-source-protection-bypassed-during-xml-deserialization"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1141947/data-source-protection-bypass-during-xml-deserialization"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35815",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T18:08:30.889Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35814 (GCVE-0-2023-35814)
Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 15:56
VLAI?
Summary
DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms.
Severity ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Affected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35814",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T15:55:54.213286Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T15:56:00.337Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "affected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.2.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.7",
"versionStartIncluding": "22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.9",
"versionStartIncluding": "22.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.3",
"versionStartIncluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.6",
"versionStartIncluding": "22.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"versionStartIncluding": "23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T15:54:16.095Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1141158/missing-protection-of-xtrareport-serialized-data-in-asp-net-web-forms"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1160535/web-reporting-well-formed-request-to-a-report-control-s-backend-can-use"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1158413/the-allowpassingdatasourceconnectionparameterstoclient-method-may-allow-untrusted-access"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35814",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T15:56:00.337Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35817 (GCVE-0-2023-35817)
Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:03
VLAI?
Summary
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
Severity ?
5 (Medium)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Unaffected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35817",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T18:02:56.672870Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T18:03:18.175Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "unaffected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 allows AsyncDownloader SSRF."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918 Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T16:12:35.996Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1161404/report-and-dashboard-server-improper-default-configuration-can-lead-to-ssrf-attacks"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1162045/reporting-bi-dashboard-office-file-api-web-app-configuration-to-help-prevent-ssrf-attacks"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1157209/server-side-request-forgery-via-asyncdownloader"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35817",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T18:03:18.175Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35816 (GCVE-0-2023-35816)
Vulnerability from cvelistv5 – Published: 2025-04-28 00:00 – Updated: 2025-04-28 18:08
VLAI?
Summary
DevExpress before 23.1.3 allows arbitrary TypeConverter conversion.
Severity ?
CWE
- CWE-23 - Relative Path Traversal
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
0 , < 21.2.12
(custom)
Affected: 22 , < 22.1.7 (custom) Affected: 22.1.8 , < 22.1.9 (custom) Affected: 22.2 , < 22.2.3 (custom) Affected: 22.2.4 , < 22.2.6 (custom) Affected: 23 , < 23.1.3 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35816",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-28T18:08:00.826540Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T18:08:07.672Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"lessThan": "21.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "22.1.7",
"status": "affected",
"version": "22",
"versionType": "custom"
},
{
"lessThan": "22.1.9",
"status": "affected",
"version": "22.1.8",
"versionType": "custom"
},
{
"lessThan": "22.2.3",
"status": "affected",
"version": "22.2",
"versionType": "custom"
},
{
"lessThan": "22.2.6",
"status": "affected",
"version": "22.2.4",
"versionType": "custom"
},
{
"lessThan": "23.1.3",
"status": "affected",
"version": "23",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.2.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.7",
"versionStartIncluding": "22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.9",
"versionStartIncluding": "22.1.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.3",
"versionStartIncluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.2.6",
"versionStartIncluding": "22.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:devexpress:devexpress:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.1.3",
"versionStartIncluding": "23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress before 23.1.3 allows arbitrary TypeConverter conversion."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-23",
"description": "CWE-23 Relative Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-28T16:12:05.415Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1159641/net-desktop-and-web-controls-unsafe-data-type-deserialization"
},
{
"url": "https://code-white.com/public-vulnerability-list/"
},
{
"url": "https://supportcenter.devexpress.com/ticket/details/t1127422/insecure-arbitrary-typeconverter-conversion"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-35816",
"datePublished": "2025-04-28T00:00:00.000Z",
"dateReserved": "2023-06-17T00:00:00.000Z",
"dateUpdated": "2025-04-28T18:08:07.672Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-28684 (GCVE-0-2022-28684)
Vulnerability from cvelistv5 – Published: 2022-08-03 15:20 – Updated: 2024-08-03 06:03
VLAI?
Summary
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710.
Severity ?
8.8 (High)
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| DevExpress | DevExpress |
Affected:
20.21.01.102
|
Credits
Markus Wulftange (@mwulftange)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:03:52.478Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "DevExpress",
"vendor": "DevExpress",
"versions": [
{
"status": "affected",
"version": "20.21.01.102"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Markus Wulftange (@mwulftange)"
}
],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502: Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-03T15:20:46",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "zdi-disclosures@trendmicro.com",
"ID": "CVE-2022-28684",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "DevExpress",
"version": {
"version_data": [
{
"version_value": "20.21.01.102"
}
]
}
}
]
},
"vendor_name": "DevExpress"
}
]
}
},
"credit": "Markus Wulftange (@mwulftange)",
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16710."
}
]
},
"impact": {
"cvss": {
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502: Deserialization of Untrusted Data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-872/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2022-28684",
"datePublished": "2022-08-03T15:20:46",
"dateReserved": "2022-04-05T00:00:00",
"dateUpdated": "2024-08-03T06:03:52.478Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-36483 (GCVE-0-2021-36483)
Vulnerability from cvelistv5 – Published: 2021-08-04 10:04 – Updated: 2024-08-04 00:54
VLAI?
Summary
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:54:51.443Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-15T15:06:19",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-36483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e",
"refsource": "MISC",
"url": "https://gist.github.com/tree-chtsec/27013ed6cb297b24e44f6359439b678e"
},
{
"name": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization",
"refsource": "MISC",
"url": "https://supportcenter.devexpress.com/ticket/details/t708194/net-web-controls-unsafe-data-type-deserialization"
},
{
"name": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization",
"refsource": "MISC",
"url": "https://supportcenter.devexpress.com/ticket/details/t714296/net-desktop-controls-unsafe-data-type-deserialization"
},
{
"name": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f",
"refsource": "MISC",
"url": "https://www.chtsecurity.com/news/a01d1bc6-19c8-4187-b343-6bc685efe64f"
},
{
"name": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization",
"refsource": "CONFIRM",
"url": "https://supportcenter.devexpress.com/ticket/details/t1031535/reporting-unsafe-data-type-deserialization"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-36483",
"datePublished": "2021-08-04T10:04:29",
"dateReserved": "2021-07-12T00:00:00",
"dateUpdated": "2024-08-04T00:54:51.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}