Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3123427
was released on
08.02.2022 and deals with
"[CVE-2022-22532] HTTP Request Smuggling in SAP NetWeaver Application Server Java" within Kernel.
We advice you to follow the instructions, to resolve
http request smuggling
denial of service (dos)
with a
high potential for exploitation
in component BC-CST-IC.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
This note has been re-released with updated ‘Support Packages & Patches’ information. SAP NetWeaver Application Server Java allows unauthenticated attacker to craft a malicious HTTP server requests triggering improper shared buffer handling resulting in execution of malicious code, hijacking a user session or forcing the system to shutdown due to overload.Solution
The memory handling of SAP NetWeaver Application Server Java was hardened
The advisory is valid for
- KERNEL 7.22 24
- KERNEL 7.49 23
- KERNEL 7.53 36
- KRNL64NUC 7.22 30
- KRNL64NUC 7.22EXT 30
- KRNL64NUC 7.49 24
- KRNL64UC 7.22 30
- KRNL64UC 7.22EXT 30
- KRNL64UC 7.49 24
- KRNL64UC 7.53 36