Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SAP SE | SAP NetWeaver and ABAP Platform | KERNEL 7.22 | - | |
| SAP SE | SAP Web Dispatcher | 7.49 | - | |
| SAP SE | SAP Content Server | 7.53 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536. | https://github.com/antx-code/CVE-2022-22536 | POC Details |
| 2 | None | https://github.com/tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536 | POC Details |
| 3 | SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536. | https://github.com/ZZ-SOCMAP/CVE-2022-22536 | POC Details |
| 4 | SAPGateBreaker is a PoC exploit for CVE-2022-22536, a critical HTTP Request Smuggling vulnerability in SAP NetWeaver. It demonstrates how to bypass ACLs by desynchronizing request parsing between ICM and backend services using crafted Content-Length-based payloads. | https://github.com/BecodoExploit-mrCAT/SAPGateBreaker-Exploit | POC Details |
| 5 | SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable to request smuggling and request concatenation attacks. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22536.yaml | POC Details |
| 6 | Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files. | https://github.com/abrewer251/CVE-2022-22536_SAP_Request_Smuggling_Scanner | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-22528 | SAP Adaptive Server Enterprise 代码问题漏洞 | |
| CVE-2022-22532 | SAP多个产品环境问题漏洞 | |
| CVE-2022-22533 | SAP NetWeaver Application Server Java 资源管理错误漏洞 | |
| CVE-2022-22534 | SAP Netweaver 跨站脚本漏洞 | |
| CVE-2022-22535 | SAP ERP HCM 安全漏洞 | |
| CVE-2022-22537 | SAP 3D Visual Enterprise Viewer 输入验证错误漏洞 | |
| CVE-2022-22538 | SAP多个产品输入验证错误漏洞 | |
| CVE-2022-22540 | SAP NetWeaver AS SQL注入漏洞 | |
| CVE-2022-22539 | SAP 3D Visual Enterprise Viewer 输入验证错误漏洞 | |
| CVE-2022-22542 | Sap Crm Web Channel 信息泄露漏洞 | |
| CVE-2022-22543 | SAP NetWeaver Application Server 资源管理错误漏洞 | |
| CVE-2022-22545 | SAP NetWeaver Application Server 信息泄露漏洞 | |
| CVE-2022-22546 | SAP Business Objects Web Intelligence 跨站脚本漏洞 | |
| CVE-2022-22544 | SAP Solution Manager 安全漏洞 |
No comments yet