POC详情: 4fb5fba074f738f2fe7c8f2e547744e29f3f44eb

来源
关联漏洞
标题: SAP多个产品环境问题漏洞 (CVE-2022-22536)
描述:SAP NetWeaver Application Server Java等都是德国思爱普(SAP)公司的产品。SAP NetWeaver Application Server Java是一款提供了Java运行环境的应用程序服务器。SAP NetWeaver Application Server是一款应用程序服务器。SAP ERP是一系列用于ERP管理的软件。SAP CRM是一个客户关系管理系统。Sap Crm Web Channel等都是德国思爱普(Sap)公司的产品。Sap Crm Web Chann
描述
Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files.
介绍
# CVE-2022-22536 SAP Rquest Smuggling Scanner

This is a fast, socket-level batch scanner for **CVE-2022-22536**, a critical request smuggling vulnerability in **SAP Internet Communication Manager (ICM)** and **SAP Web Dispatcher**. It tests multiple hosts in parallel for protocol desynchronization behavior.

> CVE-2022-22536 is rated **CVSS 10.0** and is known to be exploited in the wild (CISA KEV list).  
> This tool helps identify potentially vulnerable SAP systems exposed over HTTP or HTTPS.

---

## 🚀 Features

- Supports scanning **IP[:PORT]** lists from a file
- Optional **SSL/TLS** and certificate validation
- **Parallel scanning** via multithreading
- CSV output of results
- No external dependencies except [`tqdm`] for progress bar

---

## 📦 Requirements

- Python 3.6+
- [`tqdm`](https://pypi.org/project/tqdm/)

Install:

```bash
pip install tqdm
文件快照

[4.0K] /data/pocs/4fb5fba074f738f2fe7c8f2e547744e29f3f44eb ├── [1.0K] LICENSE ├── [ 875] README.md └── [5.5K] scanner.py 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。