Lucene search

K
cve[email protected]CVE-2021-33683
HistoryJul 14, 2021 - 12:15 p.m.

CVE-2021-33683

2021-07-1412:15:09
CWE-444
web.nvd.nist.gov
21
2
sap
web dispatcher
icm
krnl32nuc
krnl32uc
krnl64nuc
krnl64uc
http request smuggling
vulnerability
cybersecurity
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

SAP Web Dispatcher and Internet Communication Manager (ICM), versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, process invalid HTTP header. The incorrect handling of the invalid Transfer-Encoding header in a particular manner leads to a possibility of HTTP Request Smuggling attack. An attacker could exploit this vulnerability to bypass web application firewall protection, divert sensitive data such as customer requests, session credentials, etc.

Affected configurations

NVD
Node
sapweb_dispatcherMatch7.8_kernel_7.21
OR
sapweb_dispatcherMatch7.21ext
OR
sapweb_dispatcherMatch7.22
OR
sapweb_dispatcherMatch7.22ext
OR
sapweb_dispatcherMatch7.49
OR
sapweb_dispatcherMatch7.53
OR
sapweb_dispatcherMatch7.73
OR
sapweb_dispatcherMatch7.77
OR
sapweb_dispatcherMatch7.81
OR
sapweb_dispatcherMatch7.82
OR
sapweb_dispatcherMatchkrnl32nuc_7.21
OR
sapweb_dispatcherMatchkrnl32uc_7.21
OR
sapweb_dispatcherMatchkrnl64nuc_7.21
OR
sapweb_dispatcherMatchkrnl64uc_7.21
OR
sapweb_dispatcherMatchwebdisp_7.53
Node
sapinternet_communication_managerMatch7.21ext
OR
sapinternet_communication_managerMatch7.22
OR
sapinternet_communication_managerMatch7.22ext
OR
sapinternet_communication_managerMatch7.49
OR
sapinternet_communication_managerMatch7.53
OR
sapinternet_communication_managerMatch7.73
OR
sapinternet_communication_managerMatch7.77
OR
sapinternet_communication_managerMatch7.81
OR
sapinternet_communication_managerMatch7.82
OR
sapinternet_communication_managerMatchkernel_7.21
OR
sapinternet_communication_managerMatchkrnl32nuc_7.21
OR
sapinternet_communication_managerMatchkrnl32uc_7.21
OR
sapinternet_communication_managerMatchkrnl64nuc_7.21
OR
sapinternet_communication_managerMatchkrnl64uc_7.21
OR
sapinternet_communication_managerMatchwebdisp_7.53

CNA Affected

[
  {
    "product": "SAP Web Dispatcher and Internet Communication Manager",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< KRNL32NUC 7.21"
      },
      {
        "status": "affected",
        "version": "< 7.21EXT"
      },
      {
        "status": "affected",
        "version": "< 7.22"
      },
      {
        "status": "affected",
        "version": "< 7.22EXT"
      },
      {
        "status": "affected",
        "version": "< KRNL32UC 7.21"
      },
      {
        "status": "affected",
        "version": "< KRNL64NUC 7.21"
      },
      {
        "status": "affected",
        "version": "< 7.49"
      },
      {
        "status": "affected",
        "version": "< KRNL64UC 7.21"
      },
      {
        "status": "affected",
        "version": "< 7.53"
      },
      {
        "status": "affected",
        "version": "< 7.73"
      },
      {
        "status": "affected",
        "version": "< WEBDISP 7.53"
      },
      {
        "status": "affected",
        "version": "< 7.77"
      },
      {
        "status": "affected",
        "version": "< 7.81"
      },
      {
        "status": "affected",
        "version": "< 7.82"
      },
      {
        "status": "affected",
        "version": "< 7.83"
      },
      {
        "status": "affected",
        "version": "< KERNEL 7.21"
      }
    ]
  }
]

Social References

More

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

22.9%

Related for CVE-2021-33683