|
|||
Rule General Information |
---|
Release Date: | 2022-02-11 | |
Rule Name: | SAP NetWeaver Application Server Remote Code Execution Vulnerability (CVE-2022-22536) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Others | |
Reference: | https://launchpad.support.sap.com/#/notes/3123396 https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://vigilance.fr/vulnerability/SAP-multiple-vulnerabilities-de-decembre-2021-37478 |