Overview
- Description
- SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.
- Source
- cna@sap.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- SAP Multiple Products HTTP Request Smuggling Vulnerability
- Exploit added on
- Aug 18, 2022
- Exploit action due
- Sep 8, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- cna@sap.com
- CWE-444
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:content_server:7.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A02FB973-7FA0-4881-B912-27F4CFBDC673" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16B3C589-DF11-459D-8A3F-1A1FD2265022" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FBC5614-7C3F-4AD8-8640-0499B8B03C64" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E8CB869-C342-4362-9A4A-298F0B5F4003" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.77:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89E7439E-F4D6-45EA-99FC-C9B34D4D590E" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.81:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252DCEF2-8DDF-467F-8869-B69A0A3426F8" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.85:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BC578BE-2308-491E-9D56-6B45AFF0FCFA" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.86:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C0E10A3-591A-4FA7-9B98-D54C3D6C63FA" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:7.87:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "150B6370-F18A-4657-95ED-D969BF7C39CE" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:8.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12974FFA-3168-4A80-ACFB-D5E065A89383" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64nuc_7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2D5BECF-C4BA-44C7-9AD7-56865DD9AD60" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB7E91DE-A52F-4E57-8397-7670E30C8B5C" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64nuc_7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB478A3C-4DD5-4F42-B2F1-9B7CCBA1B995" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23257C18-B75C-471C-9EAF-1E86DEE845FA" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A01290A1-3C1B-4AF7-9284-C164BDEC85A2" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D5F8B53-ECAD-4CD2-8F91-25112569C056" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADE160BD-659F-4517-B625-61CFB2FBD456" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_8.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88CD861F-08FB-4CE1-923C-79D1480A2259" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.22ext:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3F76E6A-2F27-450C-AAB5-E49A64079CAC" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.49:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B4A7850-377C-4463-A5D7-07F516FBD74A" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.53:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47D4D542-2EC2-490B-B4E9-3E7BB8D59B77" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.77:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E33D9481-3CF6-4AA3-B115-7903AC6DAE25" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.81:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49FF2A5B-E5F0-4991-9AA3-7CB3B8C62941" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.85:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F74EE4D5-E968-4851-89E6-4152F64930F2" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.86:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "327A87AD-6635-4511-8505-F4418CD9D49C" }, { "criteria": "cpe:2.3:a:sap:web_dispatcher:7.87:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "324C32FF-6F89-401F-9ADD-57A68320E06D" } ], "operator": "OR" } ] } ]