PoC-in-GitHub/2022/CVE-2022-22536.json
2025-11-01 09:39:42 +09:00

130 lines
No EOL
5 KiB
JSON

[
{
"id": 459508869,
"name": "CVE-2022-22536",
"full_name": "ZZ-SOCMAP\/CVE-2022-22536",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-22536",
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
"updated_at": "2025-03-05T14:48:25Z",
"pushed_at": "2022-02-21T08:58:22Z",
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 51,
"score": 0,
"subscribers_count": 3
},
{
"id": 477106089,
"name": "SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536",
"full_name": "tess-ss\/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536",
"owner": {
"login": "tess-ss",
"id": 65326024,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65326024?v=4",
"html_url": "https:\/\/github.com\/tess-ss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tess-ss\/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536",
"description": null,
"fork": false,
"created_at": "2022-04-02T16:12:56Z",
"updated_at": "2025-10-04T14:00:40Z",
"pushed_at": "2022-04-02T16:57:00Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 958863134,
"name": "SAPGateBreaker-Exploit",
"full_name": "BecodoExploit-mrCAT\/SAPGateBreaker-Exploit",
"owner": {
"login": "BecodoExploit-mrCAT",
"id": 31081984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31081984?v=4",
"html_url": "https:\/\/github.com\/BecodoExploit-mrCAT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BecodoExploit-mrCAT\/SAPGateBreaker-Exploit",
"description": "SAPGateBreaker is a PoC exploit for CVE-2022-22536, a critical HTTP Request Smuggling vulnerability in SAP NetWeaver. It demonstrates how to bypass ACLs by desynchronizing request parsing between ICM and backend services using crafted Content-Length-based payloads.",
"fork": false,
"created_at": "2025-04-01T22:16:04Z",
"updated_at": "2025-04-08T05:36:28Z",
"pushed_at": "2025-04-02T00:18:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"exploit-development",
"sap"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 1087349977,
"name": "CVE-2022-22536_SAP_Request_Smuggling_Scanner",
"full_name": "abrewer251\/CVE-2022-22536_SAP_Request_Smuggling_Scanner",
"owner": {
"login": "abrewer251",
"id": 150287770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150287770?v=4",
"html_url": "https:\/\/github.com\/abrewer251",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/abrewer251\/CVE-2022-22536_SAP_Request_Smuggling_Scanner",
"description": "Fast, socket-level scanner for detecting CVE-2022-22536 in SAP ICM or Web Dispatcher instances. Performs request smuggling tests with a crafted MPI-desync payload. Supports batch scanning IP:PORT targets via plain text files.",
"fork": false,
"created_at": "2025-10-31T19:02:02Z",
"updated_at": "2025-10-31T19:06:09Z",
"pushed_at": "2025-10-31T19:06:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]