By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
Computing

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

News Room
Last updated: 2025/04/25 at 7:21 AM
News Room Published 25 April 2025
Share
SHARE

Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.

“The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this week.

The cybersecurity said the possibility of a zero-day stems from the fact that several of the impacted systems were already running the latest patches.

Cybersecurity

The flaw is assessed to be rooted in the “/developmentserver/metadatauploader” endpoint in the NetWeaver environment, enabling unknown threat actors to upload malicious JSP-based web shells in the “servlet_jsp/irj/root/” path for persistent remote access and deliver additional payloads.

Put differently, the lightweight JSP web shell is configured to upload unauthorized files, enable entrenched control over the infected hosts, execute remote code, and siphon sensitive data.

Select incidents have been observed using the Brute Ratel C4 post-exploitation framework, as well as a well-known technique called Heaven’s Gate to bypass endpoint protections.

At least in one case, the threat actors took several days to progress from successful initial access to follow-on exploitation, raising the possibility that the attacker may be an initial access broker (IAB) that’s obtaining and selling access to other threat groups on underground forums.

“Our investigation revealed a troubling pattern, suggesting that adversaries are leveraging a known exploit and pairing it with a mix of evolving techniques to maximize their impact,” ReliaQuest said.

“SAP solutions are often used by government agencies and enterprises, making them high-value targets for attackers. As SAP solutions are often deployed on-premises, security measures for these systems are left to users; updates and patches that are not applied promptly are likely to expose these systems to greater risk of compromise.”

Coincidentally, SAP has also released an update to address a maximum severity security flaw (CVE-2025-31324, CVSS score: 10.0) that an attacker could exploit to upload arbitrary files.

Cybersecurity

“SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing an unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system,” an advisory for the vulnerability reads.

It’s likely that CVE-2025-31324 refers to the same unreported security defect given that the former also affects the same metadata uploader component. The Hacker News has reached out to ReliaQuest for further comment, and we will update the story if we hear back.

The disclosure comes a little over a month after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of another high-severity NetWeaver flaw (CVE-2017-12637) that could allow an attacker to obtain sensitive SAP configuration files.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Almost 70% of organizations continue to suffer cyber attacks although they have improved their protection
Next Article The AirPods 4 are seeing a rare price cut on EE
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Bash 5.3 Released With Many Improvements
Computing
It’s not ‘Squid Game,’ but this Netflix thriller movie with a familiar face might hit the same nerve — watch the new trailer now
News
Always Sunny, Kidfluencers: What’s New to Watch on Disney+ and Hulu the Week of July 4, 2025
News
JD to offer cheaper delivery services, bets big on on-demand sector · TechNode
Computing

You Might also Like

Computing

Bash 5.3 Released With Many Improvements

1 Min Read
Computing

JD to offer cheaper delivery services, bets big on on-demand sector · TechNode

1 Min Read
Computing

NCC gives tower companies two months to improve internet quality

5 Min Read
Computing

Link in bio: How to set up and optimize your bio links

21 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?