Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

2 vulnerabilities found for pingaccess by pingidentity

CVE-2021-31923 (GCVE-0-2021-31923)

Vulnerability from nvd – Published: 2021-09-24 02:30 – Updated: 2024-08-03 23:10
VLAI?
Summary
Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.
Severity ?
No CVSS data available.
CWE
  • HTTP Request Smuggling
Assigner
References
Impacted products
Credits
Ping Identity credits Portswigger Research for the discovery of this vulnerability. Ping Identity credits MUFG Union Bank for their responsible disclosure.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:10:31.392Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "PingAccess",
          "vendor": "Ping Identity",
          "versions": [
            {
              "status": "affected",
              "version": "5.3"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Ping Identity credits Portswigger Research for the discovery of this vulnerability."
        },
        {
          "lang": "en",
          "value": "Ping Identity credits MUFG Union Bank for their responsible disclosure."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "HTTP Request Smuggling",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-18T14:30:08.000Z",
        "orgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e",
        "shortName": "Ping Identity"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "responsible-disclosure@pingidentity.com",
          "ID": "CVE-2021-31923",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PingAccess",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Ping Identity"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Ping Identity credits Portswigger Research for the discovery of this vulnerability."
          },
          {
            "lang": "eng",
            "value": "Ping Identity credits MUFG Union Bank for their responsible disclosure."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "HTTP Request Smuggling"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html",
              "refsource": "CONFIRM",
              "url": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e",
    "assignerShortName": "Ping Identity",
    "cveId": "CVE-2021-31923",
    "datePublished": "2021-09-24T02:30:11.000Z",
    "dateReserved": "2021-04-30T00:00:00.000Z",
    "dateUpdated": "2024-08-03T23:10:31.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-31923 (GCVE-0-2021-31923)

Vulnerability from cvelistv5 – Published: 2021-09-24 02:30 – Updated: 2024-08-03 23:10
VLAI?
Summary
Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.
Severity ?
No CVSS data available.
CWE
  • HTTP Request Smuggling
Assigner
References
Impacted products
Credits
Ping Identity credits Portswigger Research for the discovery of this vulnerability. Ping Identity credits MUFG Union Bank for their responsible disclosure.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:10:31.392Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "PingAccess",
          "vendor": "Ping Identity",
          "versions": [
            {
              "status": "affected",
              "version": "5.3"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Ping Identity credits Portswigger Research for the discovery of this vulnerability."
        },
        {
          "lang": "en",
          "value": "Ping Identity credits MUFG Union Bank for their responsible disclosure."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "HTTP Request Smuggling",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-18T14:30:08.000Z",
        "orgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e",
        "shortName": "Ping Identity"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "responsible-disclosure@pingidentity.com",
          "ID": "CVE-2021-31923",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PingAccess",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Ping Identity"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Ping Identity credits Portswigger Research for the discovery of this vulnerability."
          },
          {
            "lang": "eng",
            "value": "Ping Identity credits MUFG Union Bank for their responsible disclosure."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "HTTP Request Smuggling"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html",
              "refsource": "CONFIRM",
              "url": "https://docs.pingidentity.com/bundle/pingaccess-53/page/wco1629833104567.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e",
    "assignerShortName": "Ping Identity",
    "cveId": "CVE-2021-31923",
    "datePublished": "2021-09-24T02:30:11.000Z",
    "dateReserved": "2021-04-30T00:00:00.000Z",
    "dateUpdated": "2024-08-03T23:10:31.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}