Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Canelo Valles joins 1 win as global ambassador after historic title victory

Beam Finance Forum 2025 to tackle payment fraud, cyber risk and financial processes

Is onshore wind set to revive in the UK?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework
Identity

New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework

userBy userApril 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 25, 2025Ravi LakshmananVulnerability/Enterprise Security

Threat actors may be uploading JSP Web shells with the aim of exploiting new vulnerabilities in SAP NetWeaver to facilitate uploading malicious files and code execution.

“Exploitation is likely linked to either a previously disclosed vulnerability, such as CVE-2017-9844, or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this week.

Cybersecurity said there is a possibility of zero-day stems from the fact that some of the affected systems are already running the latest patches.

Cybersecurity

The flaw is evaluated as rooted in the “/DevelopmentServer/Metadatauploader” endpoint in the NetWeaver environment, allowing unknown threat actors to upload malicious JSP-based web shells to “Servlet_jsp/IRJ/root/”, providing a path for permanent remote access and an additional payload.

Put another way, a lightweight JSP web shell is configured to upload malformed files, entrench infected hosts, execute remote code, and run Siphon-sensitive data.

Selected incidents have been observed using a framework after Brute Ratel C4 extraction and a well-known technique called Heaven’s Gate, which bypasses endpoint protection.

In at least one case, threat actors took several days from successful initial access to subsequent exploitation, increasing the likelihood that attackers are early access brokers (IABs) gaining and selling access to other threat groups at underground forums.

“Our research reveals troubling patterns and suggests that enemies are leveraging known exploits and combining them with a combination of techniques that evolve to maximize their impact,” says ReaQuest.

“SAP solutions are often used by government agencies and businesses and are highly valuable targets for attackers. As SAP solutions are often deployed on-premises, the security measures for these systems are left to the user. Updates and patches that are not applied quickly can put these systems at greater risk.”

Coincidentally, SAP has released an update to address the biggest severity security flaw (CVE-2025-31324, CVSS score: 10.0).

Cybersecurity

“SAP NetWeaver Visual Composer Metadata uploaders are not protected with proper authorization, allowing unguaranteed agents to upload viable binaries that can cause serious harm to the host system.”

CVE-2025-31324 could refer to the same unreported security flaw, given that the former also affects the metadata uploader component.

This disclosure comes just over a month after the US Cybersecurity and Infrastructure Security Agency (CISA) warned of the aggressive exploitation of another highly empirical NetWeber flaw (CVE-2017-12637) that allows attackers to retrieve sensitive SAP configuration files.

update

ReliaQuest has confirmed with Hacker News that the malicious activity mentioned above is actually leveraging a new security vulnerability that is being tracked as CVE-2025-31324.

“The vulnerability identified during an investigation published on April 22, 2025 was initially suspected to be a remote file inclusion (RFI) issue,” the company said. “However, SAP later identified it as an unlimited file upload vulnerability, allowing attackers to upload malicious files directly to the system without permission.”

(The story was updated after publication to confirm the exploitation of the new zero-day flaws.)

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy NHIS is the most dangerous blind spot in security
Next Article Top 5 Agency Stories of the Week
user
  • Website

Related Posts

Moldova police arrest suspect in a 4.5 million euro ransomware attack on a Dutch research institution

May 13, 2025

Türkiye hackers misused output messenger zero day to drop a gorun backdoor on Kurdish server

May 13, 2025

The defect in the asus patch driverhub rce can be exploited via http.

May 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Canelo Valles joins 1 win as global ambassador after historic title victory

Beam Finance Forum 2025 to tackle payment fraud, cyber risk and financial processes

Is onshore wind set to revive in the UK?

Trump in the Middle East: How much does the US Gulf invest? | Donald Trump News

Trending Posts

Trump in the Middle East: How much does the US Gulf invest? | Donald Trump News

May 13, 2025

‘No guardrails’: How India-Pakistan combat obliterated old red lines | India-Pakistan Tensions News

May 13, 2025

Russia-Ukraine War: List of Major Events, Day 1,174 | News of the Russian-Ukraine War

May 13, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Canelo Valles joins 1 win as global ambassador after historic title victory

Google launches the AI ​​Futures Fund and invests in the next wave of AI startups

AB DAO and AB Charity Foundation work together to build trustworthy infrastructure and promote global philanthropy

Top tech startup funding news for today, May 12, 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.