### [CVE-2021-38162](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38162) ![](https://img.shields.io/static/v1?label=Product&message=SAP%20Web%20Dispatcher&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20WEBDISP%20-%207.49%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-444&color=brighgreen) ### Description SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable. ### POC #### Reference - http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html #### Github - https://github.com/Onapsis/vulnerability_advisories