Rule Category

SERVER-OTHER -- Snort has detected traffic exploiting vulnerabilities in a server in the network.

Alert Message

SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt

Rule Explanation

This rule targets an HTTP smuggling attack on SAP back-end servers. The attack can be executed using a specially crafted HTTP request that is incorrectly processed by a front-end server or proxy and forwarded to the back end server. This causes the back-end server to process additional requests that may or may not be valid.

What To Look For

This rule triggers on an attempt to exploit a SAP back-end server vulnerable to CVE-2022-22536.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

Rule Categories::Server::Other

MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application

CVE

Additional Links

Rule Vulnerability

N/A

Not Applicable

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2022-22536
Loading description

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Exploit Public-Facing Application

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org