Operating System Command Injection Vulnerabilities

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify vulnerabilities to allow command execution on the operating system level in their different ABAP® code variations and what threats they can pose to the SAP system.


   Learn what the risks of having system command vulnerabilities in SAP ABAP® systems are

  Learn how to check ABAP® code for these kinds of vulnerabilities

  Learn how attackers can misuse these vulnerabilities

  Learn how to mitigate the risks of unintended system command execution via ABAP® applications

1 hour


Course Access

24/7 all Year Round

Access and Infrastructure

Technical Requirements


 Certificate Upon Completion


€ 149
per course


 Read & understand simple ABAP® implementations 
 Know the modularisation concept of ABAP® 
 Know the general frameworks for input processing 
 Know the fundamentals of software applications interacting with operating systems