Operating System Command Injection Vulnerabilities

Like with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify vulnerabilities to allow command execution on the operating system level in their different ABAP® code variations and what threats they can pose to the SAP system.


   What are the risks of system command vulnerabilities in SAP ABAP® systems

   How to check ABAP® code for this kind of vulnerabilities

  How attackers can misuse these vulnerabilities

  How to mitigate the risks of unintended system command execution via ABAP® applications

Empty space, drag to resize

1 hour


Course Access

24/7 - 365

Access and Infrastructure

 Technical Requirements


 Certificate Upon Completion


149 € per course


  • Read & Understand simple ABAP® implementations
  • Know the modularisation concept of ABAP®
  • Know the general frameworks for input processing
  • Know the fundamentals of software applications interacting with operating systems