高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| SAP SE | SAP NetWeaver and ABAP Platform | KERNEL 7.22 | - | |
| SAP SE | SAP Web Dispatcher | 7.49 | - | |
| SAP SE | SAP Content Server | 7.53 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536. | https://github.com/antx-code/CVE-2022-22536 | POC詳細 |
| 2 | None | https://github.com/tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536 | POC詳細 |
| 3 | SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536. | https://github.com/ZZ-SOCMAP/CVE-2022-22536 | POC詳細 |
| 4 | SAPGateBreaker is a PoC exploit for CVE-2022-22536, a critical HTTP Request Smuggling vulnerability in SAP NetWeaver. It demonstrates how to bypass ACLs by desynchronizing request parsing between ICM and backend services using crafted Content-Length-based payloads. | https://github.com/BecodoExploit-mrCAT/SAPGateBreaker-Exploit | POC詳細 |
| 5 | SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable to request smuggling and request concatenation attacks. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22536.yaml | POC詳細 |
| 6 | Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files. | https://github.com/abrewer251/CVE-2022-22536_SAP_Request_Smuggling_Scanner | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2022-22528 | SAP Adaptive Server Enterprise 代码问题漏洞 | |
| CVE-2022-22532 | SAP多个产品环境问题漏洞 | |
| CVE-2022-22533 | SAP NetWeaver Application Server Java 资源管理错误漏洞 | |
| CVE-2022-22534 | SAP Netweaver 跨站脚本漏洞 | |
| CVE-2022-22535 | SAP ERP HCM 安全漏洞 | |
| CVE-2022-22537 | SAP 3D Visual Enterprise Viewer 输入验证错误漏洞 | |
| CVE-2022-22538 | SAP多个产品输入验证错误漏洞 | |
| CVE-2022-22540 | SAP NetWeaver AS SQL注入漏洞 | |
| CVE-2022-22539 | SAP 3D Visual Enterprise Viewer 输入验证错误漏洞 | |
| CVE-2022-22542 | Sap Crm Web Channel 信息泄露漏洞 | |
| CVE-2022-22543 | SAP NetWeaver Application Server 资源管理错误漏洞 | |
| CVE-2022-22545 | SAP NetWeaver Application Server 信息泄露漏洞 | |
| CVE-2022-22546 | SAP Business Objects Web Intelligence 跨站脚本漏洞 | |
| CVE-2022-22544 | SAP Solution Manager 安全漏洞 |
まだコメントはありません