# SAP NetWeaver中的授权检查缺失(视觉开发服务器)
## 漏洞概述
SAP NetWeaver Visual Composer Metadata Uploader由于缺乏适当的授权保护,允许未认证的攻击者上传潜在的恶意可执行二进制文件,从而严重危害目标主机系统。
## 影响版本
未指定具体版本
## 漏洞细节
SAP NetWeaver Visual Composer Metadata Uploader未实施适当的授权保护机制,导致任何未认证的用户均可上传恶意二进制文件至系统。
## 影响
此漏洞可能严重影响系统的保密性、完整性和可用性。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-31324.yaml | POC详情 |
2 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system. | https://github.com/rxerium/CVE-2025-31324 | POC详情 |
3 | CVE-2025-31324, SAP Exploit | https://github.com/redrays-io/CVE-2025-31324 | POC详情 |
4 | None | https://github.com/Onapsis/Onapsis_CVE-2025-31324_Scanner_Tools | POC详情 |
5 | SAP PoC para CVE-2025-31324 | https://github.com/moften/CVE-2025-31324 | POC详情 |
6 | Nuclei template for cve-2025-31324 (SAP) | https://github.com/moften/CVE-2025-31324-NUCLEI | POC详情 |
7 | SAP NetWeaver Unauthenticated Remote Code Execution | https://github.com/Alizngnc/SAP-CVE-2025-31324 | POC详情 |
8 | Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader | https://github.com/ODST-Forge/CVE-2025-31324_PoC | POC详情 |
9 | Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader | https://github.com/abrewer251/CVE-2025-31324_PoC_SAP | POC详情 |
10 | Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader | https://github.com/Pengrey/CVE-2025-31324 | POC详情 |
11 | Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324 | https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324 | POC详情 |
12 | A totally unauthenticated file-upload endpoint in Visual Composer lets anyone drop arbitrary files (e.g., a JSP web-shell) onto the server. | https://github.com/nullcult/CVE-2025-31324-File-Upload | POC详情 |
13 | 🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324. | https://github.com/respondiq/jsp-webshell-scanner | POC详情 |
14 | A Python-based security scanner for identifying the CVE-2025-31324 vulnerability in SAP Visual Composer systems, and detecting known Indicators of Compromise (IOCs) such as malicious .jsp. | https://github.com/JonathanStross/CVE-2025-31324 | POC详情 |
15 | CVE-2025-31324 & CVE-2025-42999 vulnerability and compromise assessment tool | https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment | POC详情 |
16 | Research Purposes only | https://github.com/rf-peixoto/sap_netweaver_cve-2025-31324- | POC详情 |
17 | None | https://github.com/NULLTRACE0X/CVE-2025-31324 | POC详情 |
18 | sap-netweaver-cve-2025-31324-check | https://github.com/nairuzabulhul/nuclei-template-cve-2025-31324-check | POC详情 |
19 | SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC | https://github.com/sug4r-wr41th/CVE-2025-31324 | POC详情 |
标题: SAP for Me: Sign In -- 🔗来源链接
标签:
暂无评论