QID 376392

Date Published: 2022-02-11

QID 376392: SAP NetWeaver Request Smuggling and Request Concatenation Vulnerability

SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

Affected Versions:
Product - SAP NetWeaver Application Server Java, Versions - KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53

QID Detection Logic(s):
Scan initiates HTTP request on Web Server and determines version based on the Server Header.

An attacker would be able to obtain arbitrary data sent by any user working with the system via HTTP(S) protocol. This means that the attacker could obtain confidential information, usernames and passwords, and session cookies, as well as many other types of data.

  • CVSS V3 rated as Critical - 10 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to follow the SAP Security Patch Day - February 2022 for remediation instructions.

    CVEs related to QID 376392

    Software Advisories
    Advisory ID Software Component Link
    3123396 URL Logo wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+February+2022