Skip links

Security corrections ST-SER 2008.2, SAP security note 1415547


Various sections of source code are hard-coded for specific user names for SAP-internal test purposes in order to test specific coding sequences. This procedure is not required in the production system and can lead to problems if the same user name exists in the production system. This is unlikey however.
Risk: Hard-coded user names avoid the roles and the authorization concept.

Available fix and Supported packages

  • ST-SER | 701_2008_2 | 701_2008_2
  • ST-SER 701_2008_2 | SAPKITLOQ7 |

Affected component

    SAP Support Services


Score: 0


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.




How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies