cve/2021/CVE-2021-38162.md

18 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-38162](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38162)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Web%20Dispatcher&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20WEBDISP%20-%207.49%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-444&color=brighgreen)
### Description
SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable.
### POC
#### Reference
- http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html
#### Github
- https://github.com/Onapsis/vulnerability_advisories