Advisory
A note with CVSS 10.0 for component BC-CST-IC was released by SAP on 08.02.2022. The correction/advisory 3123396 was described with "[CVE-2022-22536] Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher" and affects the system type Kernel.
A workaround exists, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance.
The vulnerability addressed is http request smuggling within Kernel.
Risk specification
This note has been re-released with updated ‘Support Packages & Patches’ information. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches.Solution
The requests are now properly handled by SAP application server (SAP Kernel) and SAP Web Dispatcher. Although an alternative solution exists, it is advisable to apply the correction! This is the workaround, which was suggested by the SAP security experts: "Depending on your scenario, Note 3137885 describes different workarounds to temporarily fix this vulnerability. The workaround may decrease performance!".
The advisory is valid for
- CONTSERV 7.53 4
- KERNEL 7.22 24
- KERNEL 7.49 23
- KERNEL 7.53 36
- KERNEL 7.77 34
- KERNEL 7.81 24
- KERNEL 7.85 25
- KERNEL 7.86 10
- KERNEL 7.87 7
- KERNEL 8.04 11
- KRNL64NUC 7.22 30
- KRNL64NUC 7.22EXT 30
- KRNL64NUC 7.49 24
- KRNL64UC 7.22 30
- KRNL64UC 7.22EXT 30
- KRNL64UC 7.49 24
- KRNL64UC 7.53 36
- KRNL64UC 8.04 12
- WEBDISP 7.22_EXT 7
- WEBDISP 7.49 5
- WEBDISP 7.53 15
- WEBDISP 7.77 14
- WEBDISP 7.81 8
- WEBDISP 7.85 11
- WEBDISP 7.86 3
- WEBDISP 7.87