Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Report RJ-JXINI generates unnecessary source code, SAP security note 1361038

Description

The report RJ-JXINI reads the field GSTRU from the Customizing table TMC4 and expects the name of a table in this field. This information is used to generate a second report that deletes all the contents of this table as an initialization.
If TMC4-GSTRU contains further SQL statements in addition to the table name, unexpected actions may be performed in the database as a result.

Available fix and Supported packages

  • IS-M | 3.04 | 3.04/7
  • IS-M | 4.01 | 4.01_02
  • IS-M | 4.02 | 402
  • IS-M | 461 | 461
  • IS-M | 462 | 462
  • IS-M | 463 | 463
  • IS-M | 464 | 464
  • IS-M | 471 | 471
  • IS-M | 472 | 472
  • IS-M | 600 | 600
  • IS-M | 602 | 602
  • IS-M | 603 | 603
  • IS-M | 604 | 604
  • IS-M 604 | SAPK-60404INISM |
  • IS-M 464 | SAPKIPPL31 |
  • IS-M 471 | SAPKIPPM24 |
  • IS-M 472 | SAPKIPPN18 |
  • IS-M 600 | SAPK-60017INISM |
  • IS-M 602 | SAPK-60207INISM |
  • IS-M 603 | SAPK-60306INISM |

Affected component

    IS-M
    Media

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1361038

TAGS

#RJ-JXINI
#RJ-JXIN1

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.