Article Details

Scrape Timestamp (UTC): 2025-04-25 10:43:54.208

Source: https://thehackernews.com/2025/04/sap-confirms-critical-netweaver-flaw.html

Original Article Text

Click to Toggle View

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers. Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution. "The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue," ReliaQuest said in a report published this week. The cybersecurity said the possibility of a zero-day stems from the fact that several of the impacted systems were already running the latest patches. The flaw is assessed to be rooted in the "/developmentserver/metadatauploader" endpoint in the NetWeaver environment, enabling unknown threat actors to upload malicious JSP-based web shells in the "servlet_jsp/irj/root/" path for persistent remote access and deliver additional payloads. Put differently, the lightweight JSP web shell is configured to upload unauthorized files, enable entrenched control over the infected hosts, execute remote code, and siphon sensitive data. Select incidents have been observed using the Brute Ratel C4 post-exploitation framework, as well as a well-known technique called Heaven's Gate to bypass endpoint protections. At least in one case, the threat actors took several days to progress from successful initial access to follow-on exploitation, raising the possibility that the attacker may be an initial access broker (IAB) that's obtaining and selling access to other threat groups on underground forums. "Our investigation revealed a troubling pattern, suggesting that adversaries are leveraging a known exploit and pairing it with a mix of evolving techniques to maximize their impact," ReliaQuest said. "SAP solutions are often used by government agencies and enterprises, making them high-value targets for attackers. As SAP solutions are often deployed on-premises, security measures for these systems are left to users; updates and patches that are not applied promptly are likely to expose these systems to greater risk of compromise." Coincidentally, SAP has also released an update to address a maximum severity security flaw (CVE-2025-31324, CVSS score: 10.0) that an attacker could exploit to upload arbitrary files. "SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing an unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system," an advisory for the vulnerability reads. It's likely that CVE-2025-31324 refers to the same unreported security defect given that the former also affects the same metadata uploader component. The Hacker News has reached out to ReliaQuest for further comment, and we will update the story if we hear back. The disclosure comes a little over a month after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of another high-severity NetWeaver flaw (CVE-2017-12637) that could allow an attacker to obtain sensitive SAP configuration files.

Daily Brief Summary

MALWARE // Hackers Exploit SAP NetWeaver Flaw for Unauthorized Access

SAP NetWeaver exploited by hackers using JSP web shells for unauthorized file uploads and code execution.

Exploitation tied to possible zero-day vulnerability, despite systems having up-to-date patches.

Cybersecurity firm ReliaQuest identifies flaw in "/developmentserver/metadatauploader" endpoint allowing persistent remote access.

Attack sequences involve use of advanced post-exploitation tools like Brute Ratel C4 and Heaven's Gate technique.

Attackers may operate as initial access brokers, selling system access to other groups on underground forums.

SAP updates issued to address related high-severity security flaws, underscoring the critical nature of the threat.

Systems often left vulnerable due to on-premises deployment and delay in applying security updates.

Urgent risk to government agencies and enterprises using SAP solutions, compounded by high system value.