Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files.# CVE-2022-22536 SAP Rquest Smuggling Scanner
This is a fast, socket-level batch scanner for **CVE-2022-22536**, a critical request smuggling vulnerability in **SAP Internet Communication Manager (ICM)** and **SAP Web Dispatcher**. It tests multiple hosts in parallel for protocol desynchronization behavior.
> CVE-2022-22536 is rated **CVSS 10.0** and is known to be exploited in the wild (CISA KEV list).
> This tool helps identify potentially vulnerable SAP systems exposed over HTTP or HTTPS.
---
## 🚀 Features
- Supports scanning **IP[:PORT]** lists from a file
- Optional **SSL/TLS** and certificate validation
- **Parallel scanning** via multithreading
- CSV output of results
- No external dependencies except [`tqdm`] for progress bar
---
## 📦 Requirements
- Python 3.6+
- [`tqdm`](https://pypi.org/project/tqdm/)
Install:
```bash
pip install tqdm
[4.0K] /data/pocs/4fb5fba074f738f2fe7c8f2e547744e29f3f44eb
├── [1.0K] LICENSE
├── [ 875] README.md
└── [5.5K] scanner.py
1 directory, 3 files