mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#netweaver

0 Beiträge0 Beteiligte0 Beiträge heute
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> fixes maximum severity <a href="https://mastodon.thenewoil.org/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a> command execution flaw</p><p><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-maximum-severity-netweaver-command-execution-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sap-fixes-maximum-severity-netweaver-command-execution-flaw/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Hackers exploit <a href="https://mastodon.thenewoil.org/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://mastodon.thenewoil.org/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a> bug to deploy <a href="https://mastodon.thenewoil.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.thenewoil.org/tags/AutoColor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AutoColor</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
Marcel SIneM(S)US<p>Warnung vor Angriffen auf neue <a href="https://social.tchncs.de/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a>-<a href="https://social.tchncs.de/tags/Netweaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netweaver</span></a>-Lücke, <a href="https://social.tchncs.de/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> und <a href="https://social.tchncs.de/tags/Draytek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Draytek</span></a>-Router | Security <a href="https://www.heise.de/news/Warnung-vor-Angriffen-auf-neue-SAP-Netweaver-Luecke-Chrome-und-Draytek-Router-10385563.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Warnung-vor-Angr</span><span class="invisible">iffen-auf-neue-SAP-Netweaver-Luecke-Chrome-und-Draytek-Router-10385563.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/SAPNetweaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAPNetweaver</span></a> <a href="https://social.tchncs.de/tags/Vigor2960" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vigor2960</span></a> <a href="https://social.tchncs.de/tags/Vigor300B" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vigor300B</span></a> <a href="https://social.tchncs.de/tags/DraytekVigor2960" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DraytekVigor2960</span></a> <a href="https://social.tchncs.de/tags/DraytekVigor300B" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DraytekVigor300B</span></a> <a href="https://social.tchncs.de/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> :google: <a href="https://social.tchncs.de/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleChrome</span></a> <a href="https://social.tchncs.de/tags/ChromeBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChromeBrowser</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a>-<a href="https://social.tchncs.de/tags/Netweaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netweaver</span></a>-Lücke: <a href="https://social.tchncs.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a>-Gruppen springen auf | Security <a href="https://www.heise.de/news/SAP-Netweaver-Luecke-Ransomware-Gruppen-springen-auf-10384918.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/SAP-Netweaver-Lu</span><span class="invisible">ecke-Ransomware-Gruppen-springen-auf-10384918.html</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
securityaffairs<p>Experts warn of a second wave of attacks targeting <a href="https://infosec.exchange/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://infosec.exchange/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a> bug CVE-2025-31324<br><a href="https://securityaffairs.com/177522/hacking/experts-warn-of-a-second-wave-of-attacks-targeting-sap-netweaver-bug-cve-2025-31324.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/177522/hac</span><span class="invisible">king/experts-warn-of-a-second-wave-of-attacks-targeting-sap-netweaver-bug-cve-2025-31324.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Efani<p>🚨 SAP NetWeaver Zero-Day Under Active Exploitation — Patch Immediately</p><p>SAP has released an out-of-band emergency update to fix a critical zero-day vulnerability (CVE-2025-31324) in NetWeaver Visual Composer — and it’s already being exploited in the wild.</p><p>The flaw (CVSS 10.0) allows unauthenticated remote attackers to upload malicious files and gain full remote code execution — no login required.</p><p>Here’s what’s happening:<br>- Threat actors are abusing the `/developmentserver/metadatauploader` endpoint<br>- They're dropping JSP web shells and executing commands directly from browsers<br>- Post-exploitation activity includes tools like Brute Ratel and MSBuild injection for stealth<br>- Even fully patched systems were compromised — confirming this was a true zero-day</p><p>Both ReliaQuest and watchTowr have confirmed active exploitation, with attackers already moving to establish persistence and lateral movement.</p><p>Who’s affected:<br>- SAP NetWeaver Visual Composer 7.50 environments<br>- Systems exposed to the internet, especially if Visual Composer is enabled</p><p>What you need to do:<br>- Apply the emergency patch from SAP (released after the April 8 update)<br>- If you can’t patch immediately:<br> - Restrict access to the vulnerable endpoint<br> - Disable Visual Composer if unused<br> - Forward logs to SIEM and scan for unauthorized servlet uploads</p><p>Also included in the emergency update:<br>- CVE-2025-27429 — Code injection in SAP S/4HANA<br>- CVE-2025-31330 — Code injection in SAP Landscape Transformation</p><p>In a world where zero-days are increasingly exploited within hours of discovery, patching isn’t optional — it’s urgent.</p><p><a href="https://infosec.exchange/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://infosec.exchange/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://infosec.exchange/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a> zero-day allegedly exploited by an initial access broker<br><a href="https://securityaffairs.com/176983/hacking/sap-netweaver-zero-day-allegedly-exploited-by-an-initial-access-broker.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176983/hac</span><span class="invisible">king/sap-netweaver-zero-day-allegedly-exploited-by-an-initial-access-broker.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> fixed critical SSRF flaw in <a href="https://infosec.exchange/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a>'s Adobe Document Services<br><a href="https://securityaffairs.com/171839/security/sap-fixed-critical-ssrf-flaw-netweaver.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/171839/sec</span><span class="invisible">urity/sap-fixed-critical-ssrf-flaw-netweaver.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>