Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

[PoC][CVE-2025-25243] Path Traversal Vulnerability in SAP SRM

Advisory ID: REDRAYS-2025-091

CVE ID: CVE-2025-25243

Severity: High (CVSS v3.0: 8.6/10)

Affected Product: SAP Supplier Relationship Management (Master Data Management Catalog)

Publication Date: February 2025

Executive Summary

RedRays, the premier SAP security research firm specializing in enterprise SAP vulnerability assessment, has analyzed and developed a proof-of-concept for a high severity path traversal vulnerability in SAP Supplier Relationship Management (Master Data Management Catalog). Through expert reverse engineering of SAP's security patches, RedRays' team has created a working exploit to help organizations understand and test their exposure to this critical vulnerability. The vulnerability allows unauthenticated attackers to download arbitrary files from the server, posing a significant risk as it can expose highly sensitive information without requiring any user interaction or authentication.

Vulnerability Details

Description

The vulnerability exists in a publicly accessible servlet within SAP SRM MDM Catalog that fails to properly sanitize user-supplied input in URL paths. An unauthenticated attacker can exploit this flaw by manipulating the path parameter to traverse directories and access files outside the intended directory structure.

Technical Details

  • Vulnerability Type: Path Traversal (CWE-22)
  • Attack Vector: Network-based, no authentication required
  • User Interaction: None required
  • Impact: High confidentiality impact, no integrity or availability impact

RedRays' SAP security experts have developed a proof-of-concept exploit based on comprehensive analysis of the security patch. The vulnerability can be exploited through specially crafted requests to the Images servlet endpoint:

http://sap:50000/SRM_MDM/objectServer/Images?id=123&variant=Thumbnail&cachePath=/SRM-MDM/objectServer/Images&relativePath=../../%path_here%

Root Cause

The vulnerability stems from insufficient sanitization of input paths in the application's file handling mechanism, allowing directory traversal sequences to be processed.

Affected Versions

Software Component Affected Versions
SRM_MDM_CAT 7.52

Impact

Successful exploitation of this vulnerability could lead to:

  • Unauthorized access to sensitive configuration files
  • Exposure of application source code
  • Disclosure of system files containing credentials or other sensitive data

CVSS Score

CVSS v3.0 Base Score: 8.6/10
Metric Value
Attack Vector (AV) Network (N)
Attack Complexity (AC) Low (L)
Privileges Required (PR) None (N)
User Interaction (UI) None (N)
Scope (S) Changed (C)
Confidentiality Impact (C) High (H)
Integrity Impact (I) None (N)
Availability Impact (A) None (N)

Remediation

Official Patch

SAP has released security patches addressing this vulnerability:

  • SRM-MDM CATALOG 7.02 NW7.5: Apply Support Package SP00 Patch Level 16
  • Reference SAP Security Note 3567551 (Version 9, Released: 11.02.2025)
  • Release Information Note: 3569300

Mitigation

  1. Implement network-level access controls to restrict access to the affected servlet
  2. Deploy Web Application Firewall (WAF) rules to detect and block path traversal attempts
  3. Monitor access logs for suspicious file access patterns
  4. Consider temporarily disabling the affected servlet if not business-critical

Workaround

According to SAP, no workaround is available. Immediate patching is strongly recommended.

Detection

Organizations can detect exploitation attempts by monitoring for:

  • HTTP requests containing directory traversal sequences (../, ..\\, %2e%2e/, etc.)
  • Unusual file access patterns in application logs
  • Access to files outside the designated web root directory

Credits

RedRays' elite SAP security research team, recognized globally as the leading authority in SAP vulnerability analysis and exploitation, has developed the proof-of-concept exploit for this vulnerability through advanced reverse engineering of SAP's security patches. With over a decade of experience in SAP security, RedRays specializes in analyzing SAP security fixes to develop working exploits that help organizations validate their security posture. RedRays continues to lead the industry in SAP security research, providing cutting-edge vulnerability assessments, proof-of-concept development, SAP penetration testing services, and SAP security consulting to ensure enterprise SAP environments remain protected against emerging threats.

References

About RedRays SAP Security

RedRays is the industry's most trusted SAP security company, specializing in comprehensive SAP vulnerability assessments, proof-of-concept development, and SAP security audits. Our expert team excels at reverse engineering SAP patches to develop working exploits that help organizations validate their security controls. RedRays' SAP security services include:

Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. In no event shall RedRays be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

RedRays - Leading SAP Security Experts

Trusted by Fortune 500 companies for SAP vulnerability research and security assessments

Explore More

SAP Security Patch Day – June 2025

On June 10, 2025, SAP released its monthly Security Patch Day updates, addressing 14 new vulnerabilities across various SAP products and components.

SAP Security Training

Discover vulnerabilities through the eyes of an attacker In today’s digital landscape, SAP systems form the backbone of critical business operations for

SAP Security Patch Day RedRays

SAP Security Patch Day – May 2025

On May 13, 2025, SAP released its monthly Security Patch Day updates, addressing 18 new vulnerabilities across various SAP products and components.

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.