Skip links
Picture of Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Critical File Upload Vulnerability in SAP NetWeaver AS Java Deploy Service — CVE-2025-42922

Critical Component: Deploy Web Service (NetWeaver AS Java) Recommendation: Immediate patching required

The vulnerability allows an authenticated low-privileged user to upload and execute a malicious file through the Deploy Web Service upload mechanism, leading to arbitrary code execution and potential full system compromise.

Technical Details

  • Type: Insecure file upload / insufficient access control validation.
  • Issue: multipart/form-data is accepted without proper RBAC enforcement or file type/content validation.
  • Cause: Incorrect authentication annotations / insufficient role checks.
Technical PoC Screenshot

Attack Scenario

  1. An attacker obtains low-privileged credentials.
  2. They authenticate to the Deploy Web Service and send a multipart request with a malicious file (e.g. JSP).
  3. The file is uploaded to a location accessible for execution; the attacker triggers it - achieving RCE.
  4. This leads to full server takeover (privilege escalation, lateral movement, data exfiltration).
Attack Scenario Diagram

Mitigation & Recommendations

  • Immediately apply patches from SAP Security Note 3643865.
  • Perform dependency analysis according to SAP Note 1974464 before patching.
  • If patching is not possible right away - apply the temporary workaround from KBA 3646072.
  • Restrict Deploy Web Service access to administrative users only.
  • Audit logs for suspicious POST requests to deployment endpoints.

Detection Recommendations (IOC)

  • HTTP POST to DeployWS endpoints from non-admin users.
  • multipart/form-data submissions containing JSP, WAR, EAR or executable files.
  • New/unexpected URLs being accessed after file deployment.
  • Deployment activity at unusual times (e.g., night uploads).
Example WAF/log filter:
source.user != "admin" AND http.method == "POST" AND http.path CONTAINS "DeployWS" AND request.content_type CONTAINS "multipart/form-data"

Note: This information is based on source code analysis and PoC. Immediate review and patching of NetWeaver AS Java environments is strongly advised.

Explore More

SAP Security Patch Day – September 2025

SAP has released its September 2025 security patch package containing 26 security notes addressing critical vulnerabilities across enterprise SAP environments. This release

SAP Security Patch Day – August 2025

SAP has released its August 2025 security patch package containing 19 security notes addressing critical vulnerabilities across enterprise SAP environments. This release

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.