First published: Wed Aug 03 2022(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of DevExpress. Authentication is required to exploit this vulnerability. The specific flaw exists within the SafeBinaryFormatter library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
openMairie Openpresse | ||
openMairie Openpresse | >=18.1.0<18.1.18 | |
openMairie Openpresse | >=18.2.0<18.2.17 | |
openMairie Openpresse | >=19.1.0<19.1.15 | |
openMairie Openpresse | >=19.2.0<19.2.14 | |
openMairie Openpresse | >=20.1.0<20.1.15 | |
openMairie Openpresse | >=20.2.0<20.2.11 | |
openMairie Openpresse | >=21.1.0<21.1.9 | |
openMairie Openpresse | >=21.2.0<21.2.7 | |
openMairie Openpresse | =22.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28684 is a critical vulnerability that allows remote code execution on affected DevExpress installations.
To fix CVE-2022-28684, upgrade to the latest version of DevExpress that addresses this vulnerability.
CVE-2022-28684 affects multiple versions of DevExpress from 18.1.0 to 22.1.0.
CVE-2022-28684 can be exploited by remote attackers, but authentication is required for the exploit.
CVE-2022-28684 results from a flaw in the SafeBinaryFormatter library due to the lack of proper validation.