#NetWeaver

2025-05-11

Chinese #Hackers #Exploit SAP #RCE Flaw CVE-2025-31324, Deploy Golang-Based #SuperShell

CVE-2025-31324 refers to a critical #SAP #NetWeaver flaw that allows attackers to achieve remote code execution (RCE) by uploading web shells through a susceptible "/developmentserver/metadatauploader" endpoint
#security

thehackernews.com/2025/05/chin

Security Landsecurityland
2025-04-26

A critical SAP vulnerability scoring 10/10 is actively being exploited to deploy ransomware across enterprise systems. Security experts from ReliaQuest warn this zero-day flaw in NetWeaver could compromise corporate and government data worldwide. Learn how to protect your organization now.

security.land/critical-sap-zer

2025-04-26

🚨 SAP NetWeaver Zero-Day Under Active Exploitation — Patch Immediately

SAP has released an out-of-band emergency update to fix a critical zero-day vulnerability (CVE-2025-31324) in NetWeaver Visual Composer — and it’s already being exploited in the wild.

The flaw (CVSS 10.0) allows unauthenticated remote attackers to upload malicious files and gain full remote code execution — no login required.

Here’s what’s happening:
- Threat actors are abusing the `/developmentserver/metadatauploader` endpoint
- They're dropping JSP web shells and executing commands directly from browsers
- Post-exploitation activity includes tools like Brute Ratel and MSBuild injection for stealth
- Even fully patched systems were compromised — confirming this was a true zero-day

Both ReliaQuest and watchTowr have confirmed active exploitation, with attackers already moving to establish persistence and lateral movement.

Who’s affected:
- SAP NetWeaver Visual Composer 7.50 environments
- Systems exposed to the internet, especially if Visual Composer is enabled

What you need to do:
- Apply the emergency patch from SAP (released after the April 8 update)
- If you can’t patch immediately:
- Restrict access to the vulnerable endpoint
- Disable Visual Composer if unused
- Forward logs to SIEM and scan for unauthorized servlet uploads

Also included in the emergency update:
- CVE-2025-27429 — Code injection in SAP S/4HANA
- CVE-2025-31330 — Code injection in SAP Landscape Transformation

In a world where zero-days are increasingly exploited within hours of discovery, patching isn’t optional — it’s urgent.

#SAP #NetWeaver #CyberSecurity

2025-04-26
2025-01-18

#SAP has released software updates to address critical vulnerabilities in #NetWeaver

One critical vulnerability is tracked as CVE-2025-0070, and when exploited, allows an attacker to escalate privileges. The other critical vulnerability is tracked as CVE-2025-0066, and when exploited, allows an attacker to access data within the application.

Administrators are advised to patch ASAP

#cybersecurity

bleepingcomputer.com/news/secu

maria thereza do amaralmarietheBR
2024-12-02

Redes e Netweavers:

: A arte de tecer/desvelar/perceber/sentir/se mover/pensar... em redes.

: Se você é um netweaver, em tudo que faz você vê redes.

...

open.substack.com/pub/mariathe

heise online (inoffiziell)heiseonline@squeet.me
2021-08-11
Aufgrund von mehreren Schwachstellen könnte betriebswirtschaftliche Software von SAP als Einfallstor für Angreifer dienen.
Patchday: SAP stopft kritische Sicherheitslücken in Business One & Co.
heise online (inoffiziell)heiseonline@squeet.me
2021-06-09
Im Zentrum von SAPs Security-Patchday steht diesmal NetWeaver mit Sicherheitslücken von "High" bis "Critical". Aber auch weitere Produkte wurden abgesichert. Patchday: SAP NetWeaver AS für ABAP & Java erhält viele wichtige Lücken-Fixes

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst