CVE-2025-42919

5.3 MEDIUM

📋 TL;DR

CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java that allows unauthenticated attackers to access internal metadata files via URL path traversal. This affects organizations running vulnerable SAP NetWeaver Java systems, potentially exposing sensitive application configuration details.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server Java
Versions: Specific versions not detailed in advisory; check SAP Note 3643603
Operating Systems: All supported platforms for SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in standard configurations; requires SAP NetWeaver Java deployment

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive metadata revealing application architecture, configuration details, or internal paths that could facilitate further attacks.

🟠

Likely Case

Unauthorized access to metadata files containing application configuration, directory structures, or technical details that shouldn't be publicly accessible.

🟢

If Mitigated

Limited exposure of non-critical metadata with no direct access to sensitive data or system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves URL manipulation with path traversal techniques

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3643603 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3643603

Restart Required: Yes

Instructions:

1. Review SAP Note 3643603 for your specific version. 2. Apply the SAP Security Patch Day updates. 3. Restart affected SAP NetWeaver Java instances. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Configure WAF to block URL path traversal patterns and restrict access to metadata directories

Access Control Restrictions

all

Implement network segmentation and restrict access to SAP NetWeaver interfaces to trusted sources only

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to SAP NetWeaver interfaces
  • Deploy web application firewall with rules to detect and block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Test for path traversal by attempting to access known metadata paths via manipulated URLs

Check Version:

Check SAP system version via transaction SM51 or system information

Verify Fix Applied:

Verify patch installation via SAP Note 3643603 and retest path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with path traversal sequences in web server logs
  • Multiple failed attempts to access metadata directories

Network Indicators:

  • HTTP requests containing '../' sequences or attempts to access known metadata paths

SIEM Query:

web.url:*../* AND (web.url:*metadata* OR web.url:*config*)

🔗 References

📤 Share & Export