eLearning
Operating System Command Injection Vulnerabilities

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify vulnerabilities to allow command execution on the operating system level in their different ABAP® code variations and what threats they can pose to the SAP system.




Objectives

   Learn what the risks of having system command vulnerabilities in SAP ABAP® systems are

  Learn how to check ABAP® code for these kinds of vulnerabilities

  Learn how attackers can misuse these vulnerabilities

  Learn how to mitigate the risks of unintended system command execution via ABAP® applications
Duration

1 hour

Instructor

Course Access

24/7 all Year Round

Access and Infrastructure

Technical Requirements

Certification

 Certificate Upon Completion

Price

€ 149
per course

Prerequisites

 Read & understand simple ABAP® implementations 
 Know the modularisation concept of ABAP® 
 Know the general frameworks for input processing 
 Know the fundamentals of software applications interacting with operating systems