# SAP NetWeaver中的授权检查缺失(视觉开发服务器)
## 漏洞概述
SAP NetWeaver Visual Composer Metadata Uploader由于缺乏适当的授权保护,允许未认证的攻击者上传潜在的恶意可执行二进制文件,从而严重危害目标主机系统。
## 影响版本
未指定具体版本
## 漏洞细节
SAP NetWeaver Visual Composer Metadata Uploader未实施适当的授权保护机制,导致任何未认证的用户均可上传恶意二进制文件至系统。
## 影响
此漏洞可能严重影响系统的保密性、完整性和可用性。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-31324.yaml | POC详情 |
| 2 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system. | https://github.com/rxerium/CVE-2025-31324 | POC详情 |
| 3 | CVE-2025-31324, SAP Exploit | https://github.com/redrays-io/CVE-2025-31324 | POC详情 |
| 4 | None | https://github.com/Onapsis/Onapsis_CVE-2025-31324_Scanner_Tools | POC详情 |
| 5 | SAP PoC para CVE-2025-31324 | https://github.com/moften/CVE-2025-31324 | POC详情 |
| 6 | Nuclei template for cve-2025-31324 (SAP) | https://github.com/moften/CVE-2025-31324-NUCLEI | POC详情 |
| 7 | SAP NetWeaver Unauthenticated Remote Code Execution | https://github.com/Alizngnc/SAP-CVE-2025-31324 | POC详情 |
| 8 | Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader | https://github.com/ODST-Forge/CVE-2025-31324_PoC | POC详情 |
| 9 | Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader | https://github.com/abrewer251/CVE-2025-31324_PoC_SAP | POC详情 |
| 10 | Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader | https://github.com/Pengrey/CVE-2025-31324 | POC详情 |
| 11 | Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324 | https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324 | POC详情 |
| 12 | A totally unauthenticated file-upload endpoint in Visual Composer lets anyone drop arbitrary files (e.g., a JSP web-shell) onto the server. | https://github.com/nullcult/CVE-2025-31324-File-Upload | POC详情 |
| 13 | 🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324. | https://github.com/respondiq/jsp-webshell-scanner | POC详情 |
| 14 | A Python-based security scanner for identifying the CVE-2025-31324 vulnerability in SAP Visual Composer systems, and detecting known Indicators of Compromise (IOCs) such as malicious .jsp. | https://github.com/JonathanStross/CVE-2025-31324 | POC详情 |
| 15 | CVE-2025-31324 & CVE-2025-42999 vulnerability and compromise assessment tool | https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment | POC详情 |
| 16 | Research Purposes only | https://github.com/rf-peixoto/sap_netweaver_cve-2025-31324- | POC详情 |
| 17 | None | https://github.com/NULLTRACE0X/CVE-2025-31324 | POC详情 |
| 18 | sap-netweaver-cve-2025-31324-check | https://github.com/nairuzabulhul/nuclei-template-cve-2025-31324-check | POC详情 |
| 19 | SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC | https://github.com/sug4r-wr41th/CVE-2025-31324 | POC详情 |
| 20 | sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324 | https://github.com/antichainalysis/sap-netweaver-0day-CVE-2025-31324 | POC详情 |
| 21 | None | https://github.com/harshitvarma05/CVE-2025-31324-Exploits | POC详情 |
| 22 | Proof-of-Concept 0day for SAP NetWeaver created by ShinyHunters | https://github.com/aristois913/CVE-2025-31324 | POC详情 |
标题: SAP for Me: Sign In -- 🔗来源链接
标签:
标题: Access Denied -- 🔗来源链接
标签:
神龙速读:
从这个网页截图中,我们可以获取到以下关于漏洞的关键信息:
1. **访问被拒绝**:用户尝试访问的URL是`http://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html`,但被服务器拒绝访问。
2. **参考编号**:访问被拒绝的参考编号是`#18.5c8a1402.1725986394.a978303`。
3. **错误页面链接**:用户可以访问`https://errors.edgesuite.net/18.5c8a1402.1725986394.a978303`以获取更多关于错误的信息。
这些信息可以帮助用户了解访问被拒绝的原因,并可能提供进一步的诊断和解决方案。
暂无评论