Skip to main content

CVE-2023-35817: CWE-918 Server-Side Request Forgery (SSRF) in DevExpress DevExpress

Medium
VulnerabilityCVE-2023-35817cvecve-2023-35817cwe-918
Published: Mon Apr 28 2025 (04/28/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: DevExpress
Product: DevExpress

Description

DevExpress before 23.1.3 allows AsyncDownloader SSRF.

AI-Powered Analysis

AILast updated: 06/24/2025, 21:05:02 UTC

Technical Analysis

CVE-2023-35817 is a Server-Side Request Forgery (SSRF) vulnerability identified in DevExpress products prior to version 23.1.3, specifically affecting the AsyncDownloader component. SSRF vulnerabilities occur when an attacker can abuse a server-side application to make HTTP requests to arbitrary domains or internal systems that the attacker would not normally have access to. In this case, the AsyncDownloader functionality in DevExpress allows an attacker with at least low-level privileges (PR:L) to trigger server-side HTTP requests without requiring user interaction (UI:N). The vulnerability has a CVSS 3.1 base score of 5.0, indicating medium severity. The vector string (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts the integrity of the system with a scope change, but does not affect confidentiality or availability. Technically, the SSRF flaw allows an attacker to coerce the vulnerable server to send crafted HTTP requests to internal or external resources. This can be leveraged to access internal services behind firewalls, perform port scanning, or potentially exploit other vulnerabilities in internal systems. The integrity impact suggests that the attacker could manipulate or interfere with data or processes via these forged requests, but there is no direct confidentiality breach or denial of service indicated. The vulnerability affects multiple versions of DevExpress, including 22.1.8, 22.2, 22.2.4, and 23, highlighting a broad exposure for organizations using these versions. No known exploits are currently reported in the wild, but the presence of the vulnerability in widely used UI and development components makes it a notable risk. The vulnerability is classified under CWE-918, which covers SSRF issues where the server is tricked into making unintended requests. Given the asynchronous nature of the AsyncDownloader, the server may process these requests in the background, potentially increasing the attack surface and making detection more difficult. The lack of a patch link in the provided data suggests organizations should verify with DevExpress for updates or mitigations.

Potential Impact

For European organizations, the impact of CVE-2023-35817 can be significant, especially for those relying on DevExpress components in their web applications or internal tools. SSRF vulnerabilities can be exploited to bypass network segmentation and access internal services that are otherwise inaccessible from the internet, such as internal APIs, databases, or cloud metadata services. This could lead to unauthorized data manipulation (integrity impact) or serve as a pivot point for further attacks within the network. Although confidentiality and availability are not directly impacted, the integrity compromise can undermine trust in business-critical applications and lead to data corruption or unauthorized changes. Industries with sensitive internal systems, such as finance, healthcare, and government, may face increased risk due to the potential for lateral movement and exploitation of internal resources. The medium severity rating suggests that while the vulnerability is not immediately critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities. The requirement for low privileges means that attackers who have gained limited access (e.g., through phishing or compromised credentials) could leverage this SSRF to expand their foothold. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers often develop exploits after public disclosure.

Mitigation Recommendations

1. Upgrade DevExpress components to version 23.1.3 or later, where this SSRF vulnerability is fixed. Regularly check DevExpress advisories for patches or updates. 2. Implement strict input validation and sanitization on any user-controllable parameters that influence AsyncDownloader requests to prevent injection of arbitrary URLs. 3. Employ network-level controls such as egress filtering and firewall rules to restrict outbound HTTP requests from application servers to only trusted destinations, minimizing the potential impact of SSRF. 4. Use web application firewalls (WAFs) with SSRF detection capabilities to monitor and block suspicious request patterns targeting AsyncDownloader endpoints. 5. Conduct internal network segmentation to limit access from application servers to sensitive internal services, reducing the attack surface if SSRF is exploited. 6. Monitor logs for unusual outbound requests initiated by the AsyncDownloader component, especially those targeting internal IP ranges or unexpected external domains. 7. Enforce the principle of least privilege for application accounts and services to reduce the ability of an attacker to exploit the vulnerability. 8. If immediate patching is not possible, consider disabling or restricting the AsyncDownloader feature temporarily until a fix is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-06-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef522

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 9:05:02 PM

Last updated: 8/14/2025, 11:55:08 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats