Third-Party Security Scanner Alerts and False Positive Reports
- 11 minutes to read
As you may know, third-party security scanners and services often rely on generic signatures. These signatures can trigger alerts that do not represent legitimate security risks.
This help topic documents/describes known false-positive scanner alerts. Each section explains scope and the technical reasoning behind our analysis/conclusion.
Cross-Site Scripting (CWE-79, CWE-80)
- CWE-79
- Improper Neutralization of Input During Web Page Generation
- CWE-80
- Improper Neutralization of Script-Related HTML Tags in a Web Page
Scanner Tools
- WAS (Web Application Security) Tools
- Veracode
WAS Alerts
Warning
A test payload generated a syntax error within the Web Application. This often points to a problem with input validation routines or lack of filters on user-supplied content.
Warning
The test successfully embedded a script in the response as part of an existing JavaScript content. When the original script is executed, the injected script will be executed as well. This means that the application is vulnerable to Cross-Site Scripting attacks.
Warning
A malicious user may be able to create a denial of service, serious error, or exploit depending on the error encountered by the Web application.
Affected Components
- ASPxGridView
- ASPxPopupControl
- ASPxTabControl
- ASPxPageControl
- ASPxPivotGrid
- ASPxEditors with input elements
Technical Details
WAS flags hidden input fields with the _State suffix as potentially dangerous based on underlying scanner signature matching:
<input type="hidden" name="ASPxGridView1" id="ASPxGridView1_State" value="{...}">
<input type="hidden" name="ASPxPopupControl1" id="ASPxPopupControl1_State" value="{...}">
<input type="hidden" name="ASPxPageControl1" id="ASPxPageControl1_State" value="{...}">
Veracode reports this issue when an encoded value that contains a script can be assigned to an input element (for example, 1234%27A-alert%2889%29%2F%2F):
<!-- ASPxComboBox -->
<table class="dxeButtonEditSys dxeButtonEdit" id="ASPxComboBox1">
<input class="dxeEditArea dxeEditAreaSys"
id="ASPxComboBox1_I"
name="ASPxComboBox1"
type="text"
autocomplete="off" ...>
Resolution
These alerts do not indicate executable XSS. Server-side validation blocks script execution.
SQL Injection (CWE-89, CAPEC-7)
- CWE-89
- Improper Neutralization of Special Elements used in an SQL Command
- CAPEC-7
- Blind SQL Injection
Scanner Tools
- OWASP ZAP
- Veracode
- IBM Security AppScan
- SiteLock
SiteLock Alerts
Warning
Using the GET HTTP method, SiteLock found that : + The following resources may be vulnerable to blind SQL injection : + The ‘r’ parameter of the /DXR.axd CGI
Warning
Using the GET HTTP method, SiteLock found that : + The following resources may be vulnerable to blind SQL injection (time based) : + The ‘r’ parameter of the /DXR.axd CGI
Affected Scope
DXR.axdrequest parametersDevExpress.Datainternal SQL API- Search Panel (
DXSE) and Filter Row (DXFREditor) parameters
Technical Details
- DXR.axd URLs and Parameters
DXR.axdis the default DevExpress HTTP handler used in ASP.NET applications. It serves embedded DevExpress resources (images, JavaScript files, and CSS styles). These resources are packaged inside DevExpress assemblies and are requested by the browser through the DXR.axd endpoint. The handler resolves the request, retrieves the resource from the assembly, and sends it to the client.These embedded resources are intended for public access. They do not expose sensitive information or server-side code and do not interact with databases.
The DevExpress HTTP handler validates resource keys.
- Direct SQL APIs
InternalExecSql,InternalGetScalar, andInternalGetDatamethods of ConnectionProviderSql accept SQL commands, which are fully controlled by the application developer.To avoid dynamically SQL construction, execute direct SQL queries against a database and return results as scalar values, result sets, or object collections.
- Search Panel and Filter Row (Application Configuration)
DXFREditorandDXSEparameters transfer Search Panel and Filter Row editor values to filter data displayed in grid-based UI controls (for example,ASPxGridView,ASPxTreeList, andASPxCardView).In standard binding mode, filters apply at the control level. The Data Controller validates values before applying the filter. These values never reach the database.
In server mode, values are sanitized before query execution. Injected SQL cannot execute at the database level.
Resolution
DXR.axddoes not expose database access.- When working with direct SQL APIs, you must ensure that SQL queries are secure.
Improper Restriction of XML External Entity Reference (CWE-611)
Scanner Tool
- Veracode
Warning
Veracode Alert: Improper Restriction of XML External Entity Reference (‘XXE’)
Affected Component
Technical Details
XML content converts to internal file objects (FileManagerFile). The ASPxFileManager renders markup from these objects.
An attack requires direct access to the storage provider. Users cannot supply arbitrary XML sources.
Resolution
This issue does not expose XXE risk in real deployments.
Insecure Temporary File (CWE-377)
Affected Components
Technical Details
Internal code uses the GetTempFileName method to access system temporary files. Temporarily files never reach the client.
Resolution
No external access exists.
Information Exposure (CWE-201, CWE-540, CWE-615)
- CWE-201
- Insertion of Sensitive Information Into Sent Data
- CWE-540
- Inclusion of Sensitive Information in Source Code
- CWE-615
- Inclusion of Sensitive Information in Source Code Comments
Scanner Tool
- Veracode
- SecureTrust
Warning
Veracode Alert: Information Exposure Through Sent Data
Affected Scope
DXR.axdrequest parameters- ASPxPivotGrid
Technical Details
- DXR.axd URLs and Parameters
DXR.axdis the default DevExpress HTTP handler used in ASP.NET applications. It serves embedded DevExpress resources (images, JavaScript files, and CSS styles). These embedded resources are intended for public access. They do not expose sensitive information or server-side code.The word “password“ in these files does not indicate stored or transmitted credentials. It refers only to HTML input elements of type
password.- ASPxPivotGrid
UploadString(string data)andUploadStringAsync(string, object)methods handle data uploads. These methods process all information on the server.
Resolution
Passwords and sensitive information are not sent to the client. No confidential information exposure occurs.
Use of Hard-coded Credentials (CWE-798)
Scanner Tool
- Veracode
Affected Components
Technical Details
The ADSSYS account is a built-in administrator account for Advantage Database Server.
- The connection string (?1?=?2??Datasource=?0??servertype=local?userid=ADSSYS?Password=?3??TrimTrailingSpaces=tru) does not include any sensitive or user-specific information.
- Passwords and non-built-in user names are not hard-coded in the XPO library.
Resolution
Using ADSSYS in this context does not introduce security risks.
Improper Neutralization of CRLF Sequences in HTTP Headers (CWE-113)
Scanner Tool
- Veracode
Warning
Veracode Alert: Improper Neutralization of CRLF Sequences in HTTP Headers (‘HTTP Response Splitting’)
Affected Components
Technical Details
- ASPxHttpHandlerModule
- The
WriteFolderToResponseandWriteFileToResponsemethods validate requested public resources by file extension. Only.cssand.jsfiles are allowed. The API cannot be used to access arbitrary files. - ASPxSpreadsheet
- The
CreateImageBoxmethod accepts an image index. The server generates this index internally. Client input cannot alter the value or reference other data. Header manipulation is not possible through this method.
Resolution
User input cannot alter headers or access other resources.
Cleartext Storage of Sensitive Information in Memory (CWE-316)
Affected Component
Technical Details
The following classes store document protection metadata. This data prevents accidental edits. This information is not considered sensitive.
DevExpress.XtraRichEdit.Commands.ProtectionInfoDevExpress.XtraRichEdit.AuthenticationOptions
Resolution
The alert does not indicate sensitive data exposure.
Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
Scanner Tool
- Veracode
Affected Components
- DevExpress RichEdit (WinForms, WPF, ASP.NET)
- DevExpress PDF Viewer controls and PDF Document
- DevExpress File & Document APIs
- DevExpress UI Components that support export to Excel and PDF
Technical Details
Veracode flags the use of weak or risky cryptographic algorithms (such as MD5 and SHA-1). DevExpress components use these algorithms in contexts where standards or file format specifications require them (not for general-purpose cryptography).
Modern .NET components include an internal HashCodeHelper class to provide secure alternatives. Some legacy scenarios still rely on algorithms that Veracode marks as potentially unsafe.
- RichEdit
MD5 is required by the ECMA-376 standard for document protection (article 2.15.1.28).
Method:
CheckOpenXmlDocumentProtectionPassword(PasswordHashCodeCalculator calculator, string password)- Spreadsheet (XLS Export)
MD5 is mandated by the Excel Binary File Format specification (article 2.3.6.1).
Method:
MD5Hash.CreateMD5()- Office Crypto (XLS Export)
Required for compliance with the Office Document Cryptography Structure (article 2.3.4).
Method:
CipherInfo.GetAlgorithm()- PDF Export and PDF Libraries
- MD5 is required by the PDF specification for encryption (article 7.6).
- ZIP Archives
AES in ECB mode is used for decrypting legacy ZIP archives (standard ZIP encryption is weak).
Method:
ICryptoTransform CreateAesCryptoTransform(string, byte[], byte[])- PDF Digital Signatures
- SHA-1 is required by the PDF specification for digital signatures (article 12.8).
Resolution
These algorithms are used only to meet file format or standard compliance requirements. They do not expose DevExpress applications to security risks in typical usage scenarios.
External Control of File Name or Path (CWE-73)
Affected Components
- Devexpress RichEdit
- DevExpress Charts
Technical Details
- RichEdit
- The
FileDocumentImageSourceconstructor accepts a file path as part of the RichEdit public API. This behavior enables application developers to load document images from custom locations. - Charts
- The
HolidaysLoader.LoadHolidaysCollectionmethod allows applications to load holiday definitions from an XML file. The method safely processes XML content. Because this API is public, the library cannot restrict the file path value. Path validation and access control must be implemented by the application.
Resolution
These APIs themselves do not introduce vulnerabilities. Security depends on how the application supplies and validates file paths.
URL Redirection to Untrusted Site (CWE-601)
Scanner Tool
- Veracode
Affected API
GoogleDrivePersonalHelperOneDrivePersonalHelper
Technical Details
GoogleDrivePersonalHelper and OneDrivePersonalHelper classes call the HttpContext.Current.Response.Redirect method with URLs constructed exclusively from server-side values. These values are defined by the application logic and do not incorporate client input.
Resolution
Open redirect is not possible.
Use of Externally-Controlled Input to Select Classes or Code (CWE-470)
Scanner Tool
- Veracode
Affected API
DevExpress.Web.Internal.ThemesProvider.LoadCustomThemeAssemblyByPath
Technical Details
The LoadCustomThemeAssemblyByPath method calls System.Reflection.Assembly.LoadFile. This method is invoked only by the ASPxThemeDeployer tool on a developer machine. It is used to extract DevExpress theme resources for deployment within an application.
The LoadCustomThemeAssemblyByPath method is not executed at runtime in deployed applications. Users or threat actors cannot trigger it.
Resolution
Unsafe reflection does not introduce a risk in deployed applications.
Insufficient Entropy (CWE-331)
Scanner Tool
- Veracode
Warning
Veracode Alert: Insufficient Entropy
Affected Component
Technical Details
The Next(int) method is used internally by the ASPxCaptcha component.
Captcha requests occur at varying times, and image recognition introduces additional variability. These factors increase entropy and make it infeasible for a threat actor to predict generated values.
Resolution
The ASPxCaptcha component maintains sufficient randomness to prevent abuse. In practice, predicting values is impossible.
Protection Mechanism Failure (CWE-693)
Warning
Scanner Alert: Response headers include the HTTP Content-Security-Policy security header with the following security issues:
- script-src: ‘self’ can be problematic if you host JSONP, Angular or user uploaded files.
- script-src: ‘unsafe-eval’ allows the execution of code injected into DOM APIs - such as eval().
- script-src: ‘unsafe-inline’ allows the execution of unsafe in-page scripts and event handler
Affected Components
Technical Details
Security scanners report a security mechanism failure when HTTP Content-Security-Policy (CSP) headers appear overly permissive.
DevExpress ASP.NET Web Forms controls and MVC extensions rely on legacy JavaScript libraries. These libraries dynamically load scripts and execute eval or Function methods. To function correctly, the framework requires the following CSP directive:
script-src 'unsafe-inline' 'unsafe-eval' 'self'
unsafe-inlineallows in-page scripts and event handlers.unsafe-evalpermits execution of dynamic code viaeval()orFunction().selfrestricts script loading to the same origin.
These directives match standard ASP.NET Web Forms behavior. The same requirements apply to ASP.NET MVC extensions, which share the same core framework.
Resolution
This requirement matches standard ASP.NET behavior. DevExpress does not plan to remove these directives due to implementation complexity.
For strict CSP compliance, consider migrating to a modern platform. Refer to the following help topics for additional information:
- Content Security Policy in DevExpress ASP.NET Web Forms Controls
- Content Security Policy in DevExpress ASP.NET MVC Extensions
PDF Rendering CVEs
CVE (Common Vulnerabilities and Exposures)
- CVE-2017-15232
- CVE-2018-14498
- CVE-2018-19664
- CVE-2018-20330
Technical Details
DevExpress WinForms PDF Viewer, WPF PDF Viewer, and PdfDocumentProcessor, do not use the vulnerable functionality.
Resolution
DevExpress components are not impacted by security issues described in CVEs. No mitigation or code changes are required.
Affected Components
- PDF Viewer (WinForms, WPF)
- PDF Document Processor (File & Document API)
HTTP Verb Tampering
Scanner Tool
- IBM Security AppScan
Affected Scope
DXR.axdrequest parameters
Technical Details
- DXR.axd URLs and Parameters
DXR.axdis the default DevExpress HTTP handler used in ASP.NET applications. It serves embedded DevExpress resources (images, JavaScript files, and CSS styles). These embedded resources are intended for public access. They do not expose sensitive information or server-side code.
Resolution
HTTP verb manipulation cannot compromise security or access confidential data.
Unencoded Input in ASPxComboBox
Scanner Tool
- Retina Web Security Scanner
Warning
Scanner Alerts:
- “Quotes in attribute”
- “Unfiltered input parameter”
- “Unfiltered quote”
- “Unfiltered <a> tag with onmouseover handler”
Affected Component
Resolution
Input values may be modified before posting to the server. All values are encoded when rendered as client-side programmatic objects. The EncodeHtml property (enabled by default) ensures that all rendered HTML entries are safe from injection attacks.
Application-Level Configuration Warnings
Scanner Tool
- ASafaWeb
ASafaWeb Alerts
Warning
Custom errors: Fail
Warning
Request validation: Fail
Affected Scope
- Application Configuration
Resolution
These settings must be configured at the application level. Some DevExpress ASP.NET demo applications explicitly disable request validation to allow entry of all characters. This is safe for demos but should be managed appropriately in production environments.