First published: Tue Jan 24 2023(Updated: )
User’s supplied input (usually a CRLF sequence) can be used to split a returning response into two responses.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Symantec Identity Governance and Administration | =14.3 | |
Broadcom Symantec Identity Governance and Administration | =14.4.1 | |
Broadcom Symantec Identity Governance and Administration | =14.4.2 | |
Broadcom Symantec Identity Manager | =14.3 | |
Broadcom Symantec Identity Manager | =14.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23950 is classified as a medium-severity vulnerability.
To fix CVE-2023-23950, update to the latest versions of affected Broadcom products as provided in their security advisories.
CVE-2023-23950 can allow an attacker to manipulate HTTP responses by exploiting user-supplied input.
CVE-2023-23950 affects Broadcom Symantec Identity Governance and Administration versions 14.3, 14.4.1, and 14.4.2, as well as Symantec Identity Manager versions 14.3 and 14.4.
Yes, CVE-2023-23950 is remotely exploitable if the affected software is exposed to the internet.