OS Command Injection Vulnerabilities
Learn to identify and prevent operating system command injection vulnerabilities in ABAP®
Like with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify vulnerabilities to allow command execution on the operating system level in their different ABAP® code variations and what threats they can pose to the SAP system.
In this E-Learning course, you will:
- What are the risks of system command vulnerabilities in SAP ABAP systems
- How to check ABAP code for this kind of vulnerabilities,
- How attackers can misuse these vulnerabilities and
- How to mitigate the risks of unintended system command execution via ABAP applications
About the Author
Start Free Demo
Interested in signing up for our e-learning courses, but don't know what to expect?! Now you can sign up for our free demo course. read moreLearn more about the NO MONKEY Security Matrix
The NO MONKEY Security Matrix combines the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF), and our own IPAC model (In... read more