Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework
Identity

New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework

userBy userApril 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 25, 2025Ravi LakshmananVulnerability/Enterprise Security

Threat actors may be uploading JSP Web shells with the aim of exploiting new vulnerabilities in SAP NetWeaver to facilitate uploading malicious files and code execution.

“Exploitation is likely linked to either a previously disclosed vulnerability, such as CVE-2017-9844, or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this week.

Cybersecurity said there is a possibility of zero-day stems from the fact that some of the affected systems are already running the latest patches.

Cybersecurity

The flaw is evaluated as rooted in the “/DevelopmentServer/Metadatauploader” endpoint in the NetWeaver environment, allowing unknown threat actors to upload malicious JSP-based web shells to “Servlet_jsp/IRJ/root/”, providing a path for permanent remote access and an additional payload.

Put another way, a lightweight JSP web shell is configured to upload malformed files, entrench infected hosts, execute remote code, and run Siphon-sensitive data.

Selected incidents have been observed using a framework after Brute Ratel C4 extraction and a well-known technique called Heaven’s Gate, which bypasses endpoint protection.

In at least one case, threat actors took several days from successful initial access to subsequent exploitation, increasing the likelihood that attackers are early access brokers (IABs) gaining and selling access to other threat groups at underground forums.

“Our research reveals troubling patterns and suggests that enemies are leveraging known exploits and combining them with a combination of techniques that evolve to maximize their impact,” says ReaQuest.

“SAP solutions are often used by government agencies and businesses and are highly valuable targets for attackers. As SAP solutions are often deployed on-premises, the security measures for these systems are left to the user. Updates and patches that are not applied quickly can put these systems at greater risk.”

Coincidentally, SAP has released an update to address the biggest severity security flaw (CVE-2025-31324, CVSS score: 10.0).

Cybersecurity

“SAP NetWeaver Visual Composer Metadata uploaders are not protected with proper authorization, allowing unguaranteed agents to upload viable binaries that can cause serious harm to the host system.”

CVE-2025-31324 could refer to the same unreported security flaw, given that the former also affects the metadata uploader component.

This disclosure comes just over a month after the US Cybersecurity and Infrastructure Security Agency (CISA) warned of the aggressive exploitation of another highly empirical NetWeber flaw (CVE-2017-12637) that allows attackers to retrieve sensitive SAP configuration files.

update

ReliaQuest has confirmed with Hacker News that the malicious activity mentioned above is actually leveraging a new security vulnerability that is being tracked as CVE-2025-31324.

“The vulnerability identified during an investigation published on April 22, 2025 was initially suspected to be a remote file inclusion (RFI) issue,” the company said. “However, SAP later identified it as an unlimited file upload vulnerability, allowing attackers to upload malicious files directly to the system without permission.”

(The story was updated after publication to confirm the exploitation of the new zero-day flaws.)

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy NHIS is the most dangerous blind spot in security
Next Article Top 5 Agency Stories of the Week
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.