Show plain JSON{"containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "SAP NetWeaver and ABAP Platform", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "KERNEL 7.22"}, {"status": "affected", "version": "8.04"}, {"status": "affected", "version": "7.49"}, {"status": "affected", "version": "7.53"}, {"status": "affected", "version": "7.77"}, {"status": "affected", "version": "7.81"}, {"status": "affected", "version": "7.85"}, {"status": "affected", "version": "7.86"}, {"status": "affected", "version": "7.87"}, {"status": "affected", "version": "KRNL64UC 8.04"}, {"status": "affected", "version": "7.22"}, {"status": "affected", "version": "7.22EXT"}, {"status": "affected", "version": "KRNL64NUC 7.22"}]}, {"defaultStatus": "unaffected", "product": "SAP Web Dispatcher", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "7.49"}, {"status": "affected", "version": "7.53"}, {"status": "affected", "version": "7.77"}, {"status": "affected", "version": "7.81"}, {"status": "affected", "version": "7.85"}, {"status": "affected", "version": "7.22EXT"}, {"status": "affected", "version": "7.86"}, {"status": "affected", "version": "7.87"}]}, {"defaultStatus": "unaffected", "product": "SAP Content Server", "vendor": "SAP SE", "versions": [{"status": "affected", "version": "7.53"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.</p>"}], "value": "SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n"}], "problemTypes": [{"descriptions": [{"cweId": "CWE-444", "description": "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap", "dateUpdated": "2023-09-26T03:11:25.429Z"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://launchpad.support.sap.com/#/notes/3123396"}, {"tags": ["x_refsource_MISC"], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"}], "source": {"discovery": "UNKNOWN"}, "x_generator": {"engine": "Vulnogram 0.1.0-dev"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cna@sap.com", "ID": "CVE-2022-22536", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SAP NetWeaver and ABAP Platform", "version": {"version_data": [{"version_affected": "=", "version_value": "KERNEL 7.22"}, {"version_affected": "=", "version_value": "8.04"}, {"version_affected": "=", "version_value": "7.49"}, {"version_affected": "=", "version_value": "7.53"}, {"version_affected": "=", "version_value": "7.77"}, {"version_affected": "=", "version_value": "7.81"}, {"version_affected": "=", "version_value": "7.85"}, {"version_affected": "=", "version_value": "7.86"}, {"version_affected": "=", "version_value": "7.87"}, {"version_affected": "=", "version_value": "KRNL64UC 8.04"}, {"version_affected": "=", "version_value": "7.22"}, {"version_affected": "=", "version_value": "7.22EXT"}, {"version_affected": "=", "version_value": "7.49"}, {"version_affected": "=", "version_value": "7.53"}, {"version_affected": "=", "version_value": "KRNL64NUC 7.22"}, {"version_affected": "=", "version_value": "7.22EXT"}, {"version_affected": "=", "version_value": "7.49"}]}}, {"product_name": "SAP Web Dispatcher", "version": {"version_data": [{"version_affected": "=", "version_value": "7.49"}, {"version_affected": "=", "version_value": "7.53"}, {"version_affected": "=", "version_value": "7.77"}, {"version_affected": "=", "version_value": "7.81"}, {"version_affected": "=", "version_value": "7.85"}, {"version_affected": "=", "version_value": "7.22EXT"}, {"version_affected": "=", "version_value": "7.86"}, {"version_affected": "=", "version_value": "7.87"}]}}, {"product_name": "SAP Content Server", "version": {"version_data": [{"version_affected": "=", "version_value": "7.53"}]}}]}, "vendor_name": "SAP SE"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system."}]}, "impact": {"cvss": {"baseScore": "null", "vectorString": "null", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-444"}]}]}, "references": {"reference_data": [{"name": "https://launchpad.support.sap.com/#/notes/3123396", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3123396"}, {"name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "refsource": "MISC", "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T03:14:55.457Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://launchpad.support.sap.com/#/notes/3123396"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"}]}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2025-01-29T20:20:36.420396Z", "id": "CVE-2022-22536", "options": [{"Exploitation": "active"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2022-08-18", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-22536"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-01-29T20:21:03.971Z"}}]}, "cveMetadata": {"assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2022-22536", "datePublished": "2022-02-09T22:05:24.000Z", "dateReserved": "2022-01-04T00:00:00.000Z", "dateUpdated": "2025-01-29T20:21:03.971Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}