Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Report RJ-JXINI generates unnecessary source code, SAP security note 1361038

Description

The report RJ-JXINI reads the field GSTRU from the Customizing table TMC4 and expects the name of a table in this field. This information is used to generate a second report that deletes all the contents of this table as an initialization.
If TMC4-GSTRU contains further SQL statements in addition to the table name, unexpected actions may be performed in the database as a result.

Available fix and Supported packages

  • IS-M | 3.04 | 3.04/7
  • IS-M | 4.01 | 4.01_02
  • IS-M | 4.02 | 402
  • IS-M | 461 | 461
  • IS-M | 462 | 462
  • IS-M | 463 | 463
  • IS-M | 464 | 464
  • IS-M | 471 | 471
  • IS-M | 472 | 472
  • IS-M | 600 | 600
  • IS-M | 602 | 602
  • IS-M | 603 | 603
  • IS-M | 604 | 604
  • IS-M 604 | SAPK-60404INISM |
  • IS-M 464 | SAPKIPPL31 |
  • IS-M 471 | SAPKIPPM24 |
  • IS-M 472 | SAPKIPPN18 |
  • IS-M 600 | SAPK-60017INISM |
  • IS-M 602 | SAPK-60207INISM |
  • IS-M 603 | SAPK-60306INISM |

Affected component

    IS-M
    Media

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1361038

TAGS

#RJ-JXINI
#RJ-JXIN1

Explore More

SAP Security Patch Day – June 2025

On June 10, 2025, SAP released its monthly Security Patch Day updates, addressing 14 new vulnerabilities across various SAP products and components.

SAP Security Training

Discover vulnerabilities through the eyes of an attacker In today’s digital landscape, SAP systems form the backbone of critical business operations for

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.