SAP Web Dispatcher and Internet Communication Manager (ICM), versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, process invalid HTTP header. The incorrect handling of the invalid Transfer-Encoding header in a particular manner leads to a possibility of HTTP Request Smuggling attack. An attacker could exploit this vulnerability to bypass web application firewall protection, divert sensitive data such as customer requests, session credentials, etc.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-03T23:58:22.780Z
Reserved: 2021-05-28T00:00:00
Link: CVE-2021-33683

No data.

Status : Modified
Published: 2021-07-14T12:15:09.237
Modified: 2024-11-21T06:09:21.507
Link: CVE-2021-33683

No data.