4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
22.9%
SAP Web Dispatcher and Internet Communication Manager (ICM), versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, process invalid HTTP header. The incorrect handling of the invalid Transfer-Encoding header in a particular manner leads to a possibility of HTTP Request Smuggling attack. An attacker could exploit this vulnerability to bypass web application firewall protection, divert sensitive data such as customer requests, session credentials, etc.
[
{
"product": "SAP Web Dispatcher and Internet Communication Manager",
"vendor": "SAP SE",
"versions": [
{
"status": "affected",
"version": "< KRNL32NUC 7.21"
},
{
"status": "affected",
"version": "< 7.21EXT"
},
{
"status": "affected",
"version": "< 7.22"
},
{
"status": "affected",
"version": "< 7.22EXT"
},
{
"status": "affected",
"version": "< KRNL32UC 7.21"
},
{
"status": "affected",
"version": "< KRNL64NUC 7.21"
},
{
"status": "affected",
"version": "< 7.49"
},
{
"status": "affected",
"version": "< KRNL64UC 7.21"
},
{
"status": "affected",
"version": "< 7.53"
},
{
"status": "affected",
"version": "< 7.73"
},
{
"status": "affected",
"version": "< WEBDISP 7.53"
},
{
"status": "affected",
"version": "< 7.77"
},
{
"status": "affected",
"version": "< 7.81"
},
{
"status": "affected",
"version": "< 7.82"
},
{
"status": "affected",
"version": "< 7.83"
},
{
"status": "affected",
"version": "< KERNEL 7.21"
}
]
}
]
More
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
22.9%