关联漏洞
标题:
SAP多个产品环境问题漏洞
(CVE-2022-22536)
描述:SAP NetWeaver Application Server Java等都是德国思爱普(SAP)公司的产品。SAP NetWeaver Application Server Java是一款提供了Java运行环境的应用程序服务器。SAP NetWeaver Application Server是一款应用程序服务器。SAP ERP是一系列用于ERP管理的软件。SAP CRM是一个客户关系管理系统。Sap Crm Web Channel等都是德国思爱普(Sap)公司的产品。Sap Crm Web Chann
描述
Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files.
介绍
# CVE-2022-22536 SAP Rquest Smuggling Scanner
This is a fast, socket-level batch scanner for **CVE-2022-22536**, a critical request smuggling vulnerability in **SAP Internet Communication Manager (ICM)** and **SAP Web Dispatcher**. It tests multiple hosts in parallel for protocol desynchronization behavior.
> CVE-2022-22536 is rated **CVSS 10.0** and is known to be exploited in the wild (CISA KEV list).
> This tool helps identify potentially vulnerable SAP systems exposed over HTTP or HTTPS.
---
## 🚀 Features
- Supports scanning **IP[:PORT]** lists from a file
- Optional **SSL/TLS** and certificate validation
- **Parallel scanning** via multithreading
- CSV output of results
- No external dependencies except [`tqdm`] for progress bar
---
## 📦 Requirements
- Python 3.6+
- [`tqdm`](https://pypi.org/project/tqdm/)
Install:
```bash
pip install tqdm
文件快照
[4.0K] /data/pocs/4fb5fba074f738f2fe7c8f2e547744e29f3f44eb
├── [1.0K] LICENSE
├── [ 875] README.md
└── [5.5K] scanner.py
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。