### [CVE-2024-23983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23983) ![](https://img.shields.io/static/v1?label=Product&message=PingAccess&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-177%20Improper%20Handling%20of%20URL%20Encoding&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen) ### Description Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules. ### POC #### Reference - https://docs.pingidentity.com/pingaccess/latest/release_notes/pa_811_rn.html #### Github No PoCs found on GitHub currently.