关联漏洞
描述
sap-netweaver-cve-2025-31324-check
介绍
# SAP CVE-2025-31324 Check
## Overview
This template is designed to check the presence of the **SAP NetWeaver CVE-2025-31324** vulnerability. This vulnerability allows unauthorized users to upload JSP files through the `/developmentserver/metadatauploader` endpoint, which can lead to potential remote code execution.
## How to Run
### Prerequisites
- Ensure you have [Nuclei](https://github.com/projectdiscovery/nuclei) installed.
- Save the template file as `sap-netweaver-cve-2025-31324-check.yaml`.
### Basic Usage
```bash
nuclei -t sap-netweaver-cve-2025-31324-check.yaml -u https://target-url.com
文件快照
[4.0K] /data/pocs/45f836325630011a12eed08057efb0e0aa713fed
├── [ 608] README.md
└── [ 12K] sap-netweaver-cve-2025-31324-check.yaml
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。