We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-22536



Description

SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

Reserved 2022-01-04 | Published 2022-02-09 | Updated 2025-01-29 | Assigner sap

CISA Known Exploited Vulnerability

Date added 2022-08-18 | Due date 2022-09-08

Apply updates per vendor instructions.

Problem types

CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Product status

Default status
unaffected

KERNEL 7.22
affected

8.04
affected

7.49
affected

7.53
affected

7.77
affected

7.81
affected

7.85
affected

7.86
affected

7.87
affected

KRNL64UC 8.04
affected

7.22
affected

7.22EXT
affected

KRNL64NUC 7.22
affected

Default status
unaffected

7.49
affected

7.53
affected

7.77
affected

7.81
affected

7.85
affected

7.22EXT
affected

7.86
affected

7.87
affected

Default status
unaffected

7.53
affected

References

launchpad.support.sap.com/

www.sap.com/.../02/fa865ea4-167e-0010-bca6-c68f7e60039b.html

cve.org (CVE-2022-22536)

nvd.nist.gov (CVE-2022-22536)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-22536

Support options

Helpdesk Chat, Email, Knowledgebase