Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

What you need to know about the pro-Palestinian campus will protest this spring

Russia-Ukraine War: List of Major Events, Day 1,174 | News of the Russian-Ukraine War

Music mogul “Diddy” faces allegations of abuse on the first day of the US | Court News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework
Identity

New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework

userBy userApril 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 25, 2025Ravi LakshmananVulnerability/Enterprise Security

Threat actors may be uploading JSP Web shells with the aim of exploiting new vulnerabilities in SAP NetWeaver to facilitate uploading malicious files and code execution.

“Exploitation is likely linked to either a previously disclosed vulnerability, such as CVE-2017-9844, or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this week.

Cybersecurity said there is a possibility of zero-day stems from the fact that some of the affected systems are already running the latest patches.

Cybersecurity

The flaw is evaluated as rooted in the “/DevelopmentServer/Metadatauploader” endpoint in the NetWeaver environment, allowing unknown threat actors to upload malicious JSP-based web shells to “Servlet_jsp/IRJ/root/”, providing a path for permanent remote access and an additional payload.

Put another way, a lightweight JSP web shell is configured to upload malformed files, entrench infected hosts, execute remote code, and run Siphon-sensitive data.

Selected incidents have been observed using a framework after Brute Ratel C4 extraction and a well-known technique called Heaven’s Gate, which bypasses endpoint protection.

In at least one case, threat actors took several days from successful initial access to subsequent exploitation, increasing the likelihood that attackers are early access brokers (IABs) gaining and selling access to other threat groups at underground forums.

“Our research reveals troubling patterns and suggests that enemies are leveraging known exploits and combining them with a combination of techniques that evolve to maximize their impact,” says ReaQuest.

“SAP solutions are often used by government agencies and businesses and are highly valuable targets for attackers. As SAP solutions are often deployed on-premises, the security measures for these systems are left to the user. Updates and patches that are not applied quickly can put these systems at greater risk.”

Coincidentally, SAP has released an update to address the biggest severity security flaw (CVE-2025-31324, CVSS score: 10.0).

Cybersecurity

“SAP NetWeaver Visual Composer Metadata uploaders are not protected with proper authorization, allowing unguaranteed agents to upload viable binaries that can cause serious harm to the host system.”

CVE-2025-31324 could refer to the same unreported security flaw, given that the former also affects the metadata uploader component.

This disclosure comes just over a month after the US Cybersecurity and Infrastructure Security Agency (CISA) warned of the aggressive exploitation of another highly empirical NetWeber flaw (CVE-2017-12637) that allows attackers to retrieve sensitive SAP configuration files.

update

ReliaQuest has confirmed with Hacker News that the malicious activity mentioned above is actually leveraging a new security vulnerability that is being tracked as CVE-2025-31324.

“The vulnerability identified during an investigation published on April 22, 2025 was initially suspected to be a remote file inclusion (RFI) issue,” the company said. “However, SAP later identified it as an unlimited file upload vulnerability, allowing attackers to upload malicious files directly to the system without permission.”

(The story was updated after publication to confirm the exploitation of the new zero-day flaws.)

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy NHIS is the most dangerous blind spot in security
Next Article Top 5 Agency Stories of the Week
user
  • Website

Related Posts

The defect in the asus patch driverhub rce can be exploited via http.

May 12, 2025

Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

May 12, 2025

Why the published credentials remain unfixed and how to change them

May 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

What you need to know about the pro-Palestinian campus will protest this spring

Russia-Ukraine War: List of Major Events, Day 1,174 | News of the Russian-Ukraine War

Music mogul “Diddy” faces allegations of abuse on the first day of the US | Court News

House Republicans are proposing $5 billion for private school vouchers

Trending Posts

Russia-Ukraine War: List of Major Events, Day 1,174 | News of the Russian-Ukraine War

May 13, 2025

Music mogul “Diddy” faces allegations of abuse on the first day of the US | Court News

May 12, 2025

Heavy gunfire, clash in Tripoli, Libya after killing militia leader | United Nations News

May 12, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google launches the AI ​​Futures Fund and invests in the next wave of AI startups

AB DAO and AB Charity Foundation work together to build trustworthy infrastructure and promote global philanthropy

Top tech startup funding news for today, May 12, 2025

Israeli startup Classiq raises $110 million to become “microsoft in quantum computing.”

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.