-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
feat: SAP Netweaver CVE-2025-31324 Potential Exploitation #5387
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Why not use |
Done |
frack113
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR adds detection rules for potential exploitation of SAP NetWeaver CVE-2025-31324, focusing on identifying webshell creation and suspicious child processes that could indicate compromise.
- Adds detection rules for suspicious child processes spawned by SAP NetWeaver on both Windows and Linux
- Implements file event monitoring for potential webshell creation in SAP NetWeaver directories
- Targets CVE-2025-31324 exploitation attempts through process and file monitoring
Reviewed Changes
Copilot reviewed 4 out of 4 changed files in this pull request and generated 4 comments.
| File | Description |
|---|---|
| proc_creation_win_sap_netweaver_susp_child_process.yml | Windows process creation rule detecting suspicious child processes from SAP NetWeaver |
| proc_creation_lnx_sap_nwtweaver_sup_child_process.yml | Linux process creation rule detecting suspicious child processes from SAP NetWeaver |
| file_event_win_sap_netweaver_webshell_creation.yml | Windows file event rule detecting potential webshell creation in SAP NetWeaver directories |
| file_event_lnx_sap_netweaver_webshell_creation.yml | Linux file event rule detecting potential webshell creation in SAP NetWeaver directories |
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
...-threats/2025/Exploits/CVE-2025-31324/proc_creation_lnx_sap_netweaver_susp_child_process.yml
Show resolved
Hide resolved
...ging-threats/2025/Exploits/CVE-2025-31324/file_event_win_sap_netweaver_webshell_creation.yml
Show resolved
Hide resolved
...ging-threats/2025/Exploits/CVE-2025-31324/file_event_lnx_sap_netweaver_webshell_creation.yml
Show resolved
Hide resolved
...ging-threats/2025/Exploits/CVE-2025-31324/file_event_lnx_sap_netweaver_webshell_creation.yml
Outdated
Show resolved
Hide resolved
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
c429310 to
b80f197
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
Copilot reviewed 4 out of 4 changed files in this pull request and generated 2 comments.
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
Summary of the Pull Request
SAP Netweaver CVE-2025-31324 Potential Exploitation
Changelog
new: Potential SAP NetWeaver Webshell Creation - Linux
new: Potential SAP NetWeaver Webshell Creation
new: Suspicious Child Process of SAP NetWeaver - Linux
new: Suspicious Child Process of SAP NetWeaver
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions