POC详情: 28e36f647f714441b6f9ad973f375f8f0ee3d20a

来源
关联漏洞
标题: SAP NetWeaver Visual Composer Metadata Uploader 代码问题漏洞 (CVE-2025-31324)
描述:SAP NetWeaver Visual Composer Metadata Uploader是德国思爱普(SAP)公司的一个用于辅助建模的工具。 SAP NetWeaver Visual Composer Metadata Uploader存在代码问题漏洞,该漏洞源于授权不当,可能导致上传恶意可执行文件。
描述
SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC
介绍
# CVE-2025-31324

A proof of concept developed to exploit [CVE-2025-31324](https://nvd.nist.gov/vuln/detail/CVE-2025-31324).

# Usage

```
usage: python CVE-2025-31324.py --help

SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC

positional arguments:
  FILE           local file to upload

optional arguments:
  -h, --help     show this help message and exit
  --https        use HTTPS?
  --RHOST RHOST  remote host
  --RPORT RPORT  remote port
  -v, --version  show program's version number and exit
```

Use the following Google dork `inurl:/developmentserver/metadatauploader` to find vulnerable istances.

# Affected Versions

All versions of SAP NetWeaver Visual Composer Metadata Uploader <= 7.50

# Patch Guidance

Please, refer to the [official documentation](https://me.sap.com/notes/3594142).

# Authors

Made by [@sug4r-wr41th](https://github.com/sug4r-wr41th)

# Disclaimer

Fair Use disclaimer: for educational purposes only.
文件快照

[4.0K] /data/pocs/28e36f647f714441b6f9ad973f375f8f0ee3d20a ├── [1.0K] CVE-2025-31324.py └── [ 965] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。