First published: Tue Sep 14 2021(Updated: )
SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Web Dispatcher | =7.22ext | |
SAP Web Dispatcher | =7.49 | |
SAP Web Dispatcher | =7.53 | |
SAP Web Dispatcher | =7.77 | |
SAP Web Dispatcher | =7.81 | |
SAP Web Dispatcher | =7.83 | |
SAP Web Dispatcher | =kernel_7.22 | |
SAP Web Dispatcher | =krnl64nuc_7.22 | |
SAP Web Dispatcher | =krnl64uc_7.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38162 is a vulnerability that affects SAP Web Dispatcher versions 7.22ext, 7.49, 7.53, 7.77, 7.81, 7.83, kernel_7.22, krnl64nuc_7.22, krnl64uc_7.22, and allows an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server.
CVE-2021-38162 has a severity rating of 9.4 (Critical).
SAP Web Dispatcher versions 7.22ext, 7.49, 7.53, 7.77, 7.81, 7.83, kernel_7.22, krnl64nuc_7.22, and krnl64uc_7.22 are affected by CVE-2021-38162.
An unauthenticated attacker can exploit CVE-2021-38162 by submitting a malicious crafted request over a network to a front-end server.
More information about CVE-2021-38162 can be found at the following references: [Link 1](http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html), [Link 2](http://seclists.org/fulldisclosure/2022/May/3), [Link 3](https://launchpad.support.sap.com/#/notes/3080567).