Skip to main content

CVE-2022-41479: n/a in n/a

High
VulnerabilityCVE-2022-41479cvecve-2022-41479
Published: Tue Oct 18 2022 (10/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The DevExpress Resource Handler (ASPxHttpHandlerModule) in DevExpress ASP.NET Web Forms Build v19.2.3 does not verify the referenced objects in the /DXR.axd?r= HTTP GET parameter. This leads to an Insecure Direct Object References (IDOR) vulnerability which allows attackers to access the application source code. NOTE: the vendor disputes this because the retrieved source code is only the DevExpress client-side application code that is, of course, intentionally readable by web browsers (a site's custom code and data is never accessible via an IDOR approach).

AI-Powered Analysis

AILast updated: 07/06/2025, 09:27:45 UTC

Technical Analysis

CVE-2022-41479 is a high-severity Insecure Direct Object References (IDOR) vulnerability found in the DevExpress ASP.NET Web Forms Build version 19.2.3, specifically within the DevExpress Resource Handler module (ASPxHttpHandlerModule). The vulnerability arises because the handler does not properly verify the referenced objects passed via the /DXR.axd?r= HTTP GET parameter. This lack of validation allows an unauthenticated attacker to request and retrieve application source code. However, the vendor disputes the severity of this issue, clarifying that the source code accessible through this vector is limited to the DevExpress client-side application code, which is inherently intended to be readable by web browsers. Importantly, the vulnerability does not expose any custom server-side code or sensitive data from the hosting application. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as attackers can access client-side source code, but there is no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked or published by the vendor. The vulnerability is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key).

Potential Impact

For European organizations using DevExpress ASP.NET Web Forms Build v19.2.3, this vulnerability could lead to unauthorized disclosure of client-side application source code. While the exposed code is not sensitive server-side logic or proprietary business logic, it could still provide attackers with insights into the client-side implementation, potentially aiding in crafting more targeted attacks such as client-side manipulation, social engineering, or reconnaissance for further exploitation. The confidentiality impact is moderate since no sensitive data or server-side code is exposed. Integrity and availability remain unaffected. Organizations relying heavily on DevExpress components for web applications should be aware that attackers can gain additional visibility into their front-end code, which might indirectly increase risk. However, the absence of known exploits and the vendor's clarification reduce the immediate threat level. Still, organizations should consider this vulnerability in their risk assessments, especially those in regulated sectors or with high-value web assets.

Mitigation Recommendations

1. Upgrade DevExpress ASP.NET Web Forms to a later version if available, where this vulnerability is addressed or mitigated. 2. If upgrading is not immediately possible, implement web application firewall (WAF) rules to monitor and block suspicious requests targeting the /DXR.axd endpoint with unusual or unexpected parameters. 3. Restrict access to the /DXR.axd resource via network-level controls or authentication mechanisms where feasible, limiting exposure to trusted users only. 4. Conduct thorough code reviews and penetration testing focused on the use of DevExpress components to identify any additional weaknesses or misconfigurations. 5. Monitor web server logs for anomalous requests to the /DXR.axd endpoint that could indicate exploitation attempts. 6. Educate development teams about the nature of client-side code exposure and ensure sensitive logic is not implemented on the client side. 7. Engage with DevExpress vendor support to obtain official patches or guidance and stay updated on any future security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec545

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 9:27:45 AM

Last updated: 8/14/2025, 10:30:18 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats