Unknown
CVE-2021-33683
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-33683
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
SAP Web Dispatcher and Internet Communication Manager (ICM), versions – KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, process invalid HTTP header. The incorrect handling of the invalid Transfer-Encoding header in a particular manner leads to a possibility of HTTP Request Smuggling attack. An attacker could exploit this vulnerability to bypass web application firewall protection, divert sensitive data such as customer requests, session credentials, etc.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- internet communication manager 7.21ext,
- internet communication manager 7.22,
- internet communication manager 7.22ext,
- internet communication manager 7.49,
- internet communication manager 7.53,
- internet communication manager 7.73,
- internet communication manager 7.77,
- internet communication manager 7.81,
- internet communication manager 7.82,
- internet communication manager kernel 7.21,
- internet communication manager krnl32nuc 7.21,
- internet communication manager krnl32uc 7.21,
- internet communication manager krnl64nuc 7.21,
- internet communication manager krnl64uc 7.21,
- internet communication manager webdisp 7.53,
- web dispatcher 7.21ext,
- web dispatcher 7.22,
- web dispatcher 7.22ext,
- web dispatcher 7.49,
- web dispatcher 7.53,
- web dispatcher 7.73,
- web dispatcher 7.77,
- web dispatcher 7.8 kernel 7.21,
- web dispatcher 7.81,
- web dispatcher 7.82,
- web dispatcher krnl32nuc 7.21,
- web dispatcher krnl32uc 7.21,
- web dispatcher krnl64nuc 7.21,
- web dispatcher krnl64uc 7.21,
- web dispatcher webdisp 7.53
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: