Layer Seven Security ADVISORY

Size: px
Start display at page:

Download "Layer Seven Security ADVISORY"

Transcription

1 Layer Seven Security ADVISORY SAP Security Notes May 01

2 There are two startling facts about SAP Security Notes released in May. The first is the sheer number of Notes issued by SAP, 57 to be exact. In comparison, March and April had just 46 and 33, respectively. The second is that almost 90 percent of the Notes were designed to provide greater protection for SAP systems against crosssite scripting attacks (XSS). There are several forms of XSS including stored, targeted at servers, and reflected, usually targeted at the client browser. The SAP patches released in May deal with both types of vulnerabilities. XSS is the most prevalent Web application security flaw and the most popular attack vector used by hackers. It works through the injection of malicious scripts into input fields used by Web applications. Encryption provides no defense against XSS. It merely encrypts the attack. XSS can be combated through a combination of code reviews (most XSS flaws can be detected by a trained eye) and input/ output validation. For the latter, refer to the OWASP XSS Prevention Guide at Vulnerability scanners such as those used by SAPSCAN greatly help with the detection of known XSS flaws in SAP systems. You can learn more about SAPSCAN at sapscan.html. SAP components are especially vulnerable to XSS since many rely upon Web-based (HTTP) communication. This includes SAP Business Suite software such as CRM and SRM and areas of the NetWeaver technology platform including the Enterprise Portal. Successful attacks can bypass SAP access controls and compromise the underlying data in such systems. SAP Security Notes May 01 Before installing the May patches, SAP customers should install the new encoding library introduced in Note (refer to Notes and ). Customers should also update Business Server Pages (BSP) (Notes , and

3 SAP Security Notes by Vulnerability Type ) and the Internet Transaction Server (ITS) (Notes and ). For more detailed instructions, follow the SAP checklist available at the SAP Marketplace. SAP also introduced a critical patch for certain Kernel functions in the month of May. The Kernel lies at the core of SAP systems and contains executable (.exe) files that support the so-called runtime environment. The Kernel is an abstraction layer between SAP systems and the underlying operating system and database layers. It supports the interoperability of SAP systems by enabling SAP to work with almost any enterprise-level OS and DB. Security Note patches a high-risk vulnerability effecting Transport Tools (BC- CTS-TLS) in the Kernel. Transport Tools includes utilities used to control releases and transfer data between SAP systems. This includes programs such as tp and R3trans that are called upon by the Change and Transport System (CTS) and Transport Management System (TMS). Missing authorization checks in this part of the Kernel could enable some users to access sensitive functions through the escalation of privileges.

4 Appendix: SAP Security Notes, May BC-CTS-TLS Missing authorization check in KERNEL BC-JAS-SEC Update 1 to security note BC-JAS-SEC-UME Update 1 to Security Note BC-BSP Update 1 to security note CRM-BF-TM Unauthorized modification of displayed content in CRM-BF-TM CRM-IC-ADR Unauthorized modificat. of displ. content in CRM-IC-ADR XAP-MBA-DSD Unauthorized modification of displayed content in MDSD Admin IS-M Unauthorized modification in ITS-Services in IS-M IS-M Unauthorized modification in BSP applications in IS-M CRM-IC-FRW Unauthorized modification of displayed content in IC_BASE PP-MES Unauthorized modification in SICF-services in PP-MES PPM-PRO Unauthorized modification of displayed content in PPM-PRO CA-GTF-SP-GEN Unauthorized modification in CA-GTF-SP-GEN SLC-REG Unauthorized use of application functions in SLC-REG CRM-IPS-BTX Unauthoried modification in BSP application in CRM-ISP-BTX CRM-MKT-SEG-IEX Unauthorized modification of displayed content in CRM_MKTIME SRM-SUS Unauthorized modification of displayed content in SRM-SUS SRM-EBP-BID Unauthorized modification of displayed content in SRM-EBP CRM-BF-CFG Unauthorized modification of displayed content in IPC UI CRM-IFS Unauthorized modification of displayed content in CRM-IFS EP-PCT-PUR-BP Unauthorized modification in BSP applicat. of EP-PCT-PUR-BP SRM-EBP-CA-ATT Malicious modification of SRM attachment url CRM-MD-PRO-OBJ Unauthorized modification of BSP in CRM-MD-PRO-OBJ

5 Appendix: SAP Security Notes, May CRM-IC-OBJ Unauthorized modification of BSP in CRM-IC-OBJ CRM-MD-PRO Unauthorized modification of BSP in CRM-MD-PRO IS-A-DP-VMS Unauthorized modification of BSP in Webdocuments IS-A-DP-SPP Unauthorized modification of BSP in Webdocuments IS-A-DP-WTY Unauthorized modification of BSP in Webdocuments FS-CD Unauthorized change of contents displayed in agency collctns CRM-BTX-PRV-DUI Unauthorized modificat. of displ. content in CRM-BTX-PRV-DUI EP-PCT-MGR-CO Unauthorized modification in BSP appl. in EP-PCT-MGR-CO CO-OM Unauthorized modification in BSP application in CO-OM EP-PCT-SD-S XSS: Source code commented out incorrectly on BSP pages SRM-EBP-CAT Unauthorized modification of displayed content in SRM-EBP PA-ER Unauthorized modification of stored content in E-Recruiting PLM-PPM-PDN Unauthorized modification of displayed content inplm-ppm-pdn CRM-IC-EMS Unauthorized modification in BSP application in CRM-IC-EMS SRM-ROS ROS: Unauthorized modification in BSP application CRM-MKT-MPL-CA Unauthorized modification in BSP application CRM-MKT-MPL-CA CRM-BF-SVY Unauthorized modification in BSP application in CRM-BF-SVY CRM-CHM Unauthorized modification of displayed content in CRM-CHM CRM-BTX-ACT Unauthorized modification in CRM Activity FIN-SEM-CPM-BSC Unauthorized modification in BSP application in FIN-SEM-CPM CRM-BF-BRF-RM Unauthorized modification in CRM Rule builder(crm-bf-brf-rm) CA-DMS Unauthorized modification of BSP in Webdocuments () CRM-IPS-ICM-ACT Unauthorized modification of displayed content in ICM IS-U-WA Unauthorized modification in ITS-Service in IS-U-WA PP-KAB Unauthorized modification in ITS-Service in KANBAN SCM-APO-CA-COP Unauthorized modification in ITS-Service in SCM-APO-CA-COP PA-ER Unauthorized use of application functions in HRRCF_START_EXT PPM-PRO Unauthorized modificatn of displayed content in PPM-PRO (1)

6 Appendix: SAP Security Notes, May BW-BCT-ISR-AA Unauthorized modif. of stored content in RSBCT_RFASH_ALI PLM-CFO Unauthorized modification of displayed content in PLM-CFO(9) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(8) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(7) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(6) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(5) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(4) PLM-CFO Unauthorized modification of displayed content in PLM-CFO(3) PLM-CFO Unauthorized modification of displayed content in PLM-CFO() BC-FES-ITS Unauthorized modification of displayed content in ITS CRM-BF-WST Unauthorized modification of content in WS_DESIGN_TOOL CRM-MD-BP-CCP Unauthorized modification of the content in CRM-MD-BP-CCP CRM-MKT-SEG-TGR Unauthorized modification of displayed content in CRM_MKT CA-GTF-PCF Unauthorized modification of displayed content in CA-GTF-PCF CRM-IT Unauthorized modification of stored content in CRM_IT_DEALER CRM-BTX-BF Unauthorized modification in CRM Business Transactions CRM-IC-FRW Unauth. mod. of displayed content in Interaction Center Frw IS-U-CS Unauthorized modification of stored content in IS-UT CRM-IC-SCR Unauthorized modification of displayed content in CRM-IC-SCR CRM-BF-ML Unauthorized modification of displayed content in CRM CRM-BF Unauthorized modification of displayed content in CRM_BSP CRM-MKT Unauthorized modification of displayed content in CRM-MKT SCM-BAS-UIF Unauthorized modification of displayed content in ICH BC-CCM-MON-SLG Directory Traversal in SAP System Log CRM-IC-ABO Unauthorized modification of displayed content in CCMP_RABOX BW-PLA-BPS-WIB Unauthorized execution of application funcs. in BW-PLA-BPS PLM-CFO Unauthorized modification of displayed content in PLM-CFO( PLM-CFO Unauthorized modification of displayed content in PLM-CFO(13

7 Appendix: SAP Security Notes, May PLM-CFO Unauthorized modification of displayed content in PLM-CFO( PLM-CFO Unauthorized modification of displayed content in PLM-CFO( PLM-CFO Unauthorized modification of displayed content in PLM-CFO( BW-BCT-CRM Unauthorized modification in BSP applications in BW-BCT-CRM PPM-PRO Unauthorized modification of displayed content in PPM PE-LSO-LPO Unauthorized modification in BSP application in PE-LSO-LPO CA-GTF-IC-SCR Unauthorized modification in BSP in CA-GTF-IC-SCR CA-GTF-IC-SCR Unauthorized modification in BSP in CA-GTF-IC-SCR PA-EC-JP Unauth. modification of displayed content in Job Pricing PA-EC-BD Unauth. modification of displayed content in Budgeting SLC-SUP Unauthorized modification of displayed content in SLC-SUP CRM-CIC-CAM Unauthorized modification of content in CRM-CLM applications PPM-PFM Unauthorized modification on document url in PPM CRM-CIC Unauthorized modification of content in CRM-CIC applications PA-PD-PM Unauthorized modification of stored content in PA-PD-PM XX-PROJ-FI-CA Unauthorized modification of BSP in FI-CA CRM-MKT-MPL-CA- BRE Unauthorized modification in CRM-MKT-MPL-CA-BRE CRM-BTX-GWI Unauthorized modification of stored content in CRM-BTX-GWI EPM-BFC-TCL Potential remote code execution in Financial Consolidation CRM-MKT-MPL-CA- MOD Unauthorized modification in CRM-MKT-MPL-CA-MOD CRM-MKT-MPL-CA- BRE Unauthorized modification in component CRM-MKT-MPL-CA-BRE CRM-ANA-SRV-BW Unauthorized modification of disp. content in CRM-ANA-SRV-BW EP-PCT-MAN-M Unauthorized modification in BSP application in PlantManager CRM-IC-ABO Unauthorized modification of content in CRM_CIC_RABOX BC-BSP Unauthorized modification of displayed content in BSP BW-BCT-EPM Unauthorized modification of stored content in BI_CONT BW-BCT-PSM Unauthorized modification of displayed content in BW-BCT-PSM

8 Appendix: SAP Security Notes, May FIN-SEM-CPM Unauthorized modification of displayed content in FIN-SEMCPM FS-BA-TO-ME code injection vulnerability in module editor CA-SUR Unauthorized modification of displ content in Web Request BC-SEC-SSF Unauthorized modification of displayed content in BSP apps PA-EC-BD Unauthorized modification displayed content ECM_BSP_LIBRAY CRM-BTX-ACT Unauthorized modification of displayed content in Calendar BC-ABA-SC Potential denial of service in DIAG Processor CA-GTF-IC-BRO Unauthorized modification in BSP in CA-GTF-IC-BRO BW-BEX-ET-WEB Directory traversal with unauthorized modification in BW FI-FM Missing authorization check in FI-FM CRM-ISE-SRE Unauthorized mod. of displayed content in Web.Req. toolbox CRM-ISE-WBF Unauthorized mod. of displayed content in UAD_xx BC-DWB-WD-ABA Unauthorized modification of displayed content in Web Dynpro PA-PA-JP Unauthorized modification in ITS-Service PA-PA-KR Unauthorized Modification in ITS-Service in PA-PA-KR BC-FES-GUI Generic low level functionality in SAP GUI CRM-BTX-ERP Unauthorized modification of content in configuration CRM-BTX-BF-ATP Unauthorized modification of content in gatp pop-up BC-WD-JAV Unauthorized Modification of Displayed Content in Web Dynpro EP-PDK-HBJ Unauthorized Modification of Displayed Content in HTMLB CRM-BF-WFI Unauthorized modification in SICF-service in CRM-BF-WFI CRM-BTX-ERP Unauthorized modification of content in ERP print preview CRM-BF-ACI Unauthorized modification of content in order print preview SLL-LEG-CUS Cross-Site-Scripting (XSS) in GTS Dashboard possible CRM-BF-COM Unauthorized modification of displayed content in CRM CM CA-GTF-PCF Unauthorized modification of stored content in CA-GTF-PCF PLM-CFO Unauthorized modification of displayed content in PLM-CFO(1) BW-BEX-ET Unauthorized modification of displayed content in BW-BEX-ET

9 Appendix: SAP Security Notes, May SRM-SUS Unauthorized modification in BSP application/sicf Service FI-TV-PL Unauthorized modification of displayed content in FI-TV-PL CRM-BF-COM Unauthorized modification of displayed content in CRM CM CRM-MKT-DAM Unauthorized modification of BSP in CRM-MKT-DAM CRM-BF-COM Unauthorized modification of displayed content in CRM CM CRM-BF-ML Unauthorized modification of displayed content in CRM IS-M-AMC Cross site scripting vulnerability in BSP pages for AMC BC-SRV-RM Unauthorized modification of stored content in BC-SRV-RM SRM-EBP-CON Unauthorized modification of stored content in SRM-EBP-CON PA-PA-CN Security: XSS vulnerability in SAP GUI for HTML CRM-ISE-WBF Unauthorized mod. of displayed content in CRM-ISE-WBF CRM-BF-ML Unauthorized modification of displayed content in CRM CRM-BF-ML Unauthorized modification of displayed content in CRM CA-EPT-ANL-LST URL in Launchpad-Navigation can be malformed BC-SRV-SSF Unauth. modification of displayed content in BC-SRV-SSF BC-SRV-GBT-ALM Unauthorized modif. of displayed content in BC-SRV-GBT-ALM CRM-ANA-PS Unauthorized modification of displayed content in BW-CRM BC-SRV-KPR-RET Unauthorized modification of displayed content in BC-SRV-KPR BC-SRV-RM Unauthorized modification of stored content in BC-SRV-RM BC-MOB-MI Unauthorized modification of displayed content in BC-MOB-MI BC-DOC-TER Potential loss of integrity in web app Terminology Tools PA-PD-PM Unauthorized modification of stored content in PA-PD-PM BC-BSP Unauthorized modification of displayed content in BSP SCM-EWM-RF Unauthorized use of application functions in SCM-EWM-RF BW-BEX-OT-MDX MDX: SOAP / XMLA interface and Document Type Definitions BC-MOB-MI Unauthorized modification of displayed content in BC-MOB-MI BC-MID-ICF Unauth. modification of displayed content in ICF Recorder IS-CC Potential modification of persisted data in SAP CC

10 Appendix: SAP Security Notes, May EP-PCT-PUR-BP Buyer: Sec. note for cross-site scripting & BSP applications BC-DB-SDB Potential info. disclosure and code execution in sapdbctrl CA-GTF-TS-WSI Unauthorized modification of stored content in CA-GTF-TS-WSI BC-WD-ABA Unauthorized modification of displayed content in WebDynpro FS-CD Unauthorized modification of displayed content agency coll BC-BSP XSS vulnerability in BSP system BC-WD-UR Unauthorized modification of displayed content in UR CA-GTF-IC-SCR Unauthorized modification in BSP in CA-GTF-IC-SCR BC-BSP Unauthorized modification of displayed content in BSP pages CA-WUI-UI-TAG Unauthorized modification of stored content in WEBCUIF CRM-ISA Potential runtime problems after manipulation of isa_relogin BC-SRV-ARL Unauthorized modification of stored content in BC-SRV-ARL EP-PIN Portal XSS Encoding Library - StringUtils BI-BIP-CMC Unauthorized modification of displayed content in BOE BC-ESI-WS-ABA- CFG Unauthorized modification of displayed content in UDDIClient PLM-CFO Update # to Security Notes PLM-CFO Update # to Security Notes BI-BIP-OP Potential denial of service in BusinessObjects Enterprise CRM-IC-CAM Unauthorized modification in BSP in CRM-IC-CAM FI-AP Obsolete ITS services in FI-AR/AP BW-BCT-PLA-RAP Unauthorized modification of displayed content in BW-BCT-PLA SRM-EBP-CA-ATT Malicious modification of displayed SRM attachments SLC-SUP SLC: Unauthorized modification in BSP application SRM-EBP-BID Unauthorizd modification in ITS services SRM-EBP-TEC-ITS Unauthorized modification in ITS-Services in SRM CA-WUI-APF Unauthorized modification of content in transaction launcher IS-M-AMC Unauthorized modification of displayed content in IS-M-AMC CRM-ISE-WBF Unauthorized mod. of displayed content in BSP CRM_PS_SOA

11 Appendix: SAP Security Notes, May CO-OM Unauthorized modification in ITS-Services of ISR SRM-EBP-PRC Unauthorized modification in ITS-Service in SRM-EBP-PRC SRM-CMT Unauthorized modification in ITS-Service in SRM-EBP-CAT IS-HER-CM Unauthorized modification in BSP application in IS-HER-CM IS-HER-CM Unauthorized modification in BSP application in IS-HER-CM SRM-EBP-VE Unauthorized modification of displayed content in VE IS-M-AMC Unauthorized modification of displayed content in IS-M-AMC FI-AA Obsolete ITS services in FI-AA SRM-EBP-INV Unauthorized modification of ITS in SRM-EBP-INV PLM-PPM-PDN Unauthorized modification of displayed content PLM-PPM-PDN SRM-EBP-APM Unauthorized modification of displayed content in APM CRM-IC-EMS-RUL Unauthorized modification in BSP app in CRM-IC-EMS-RUL PS-CLM Unauthorized modification in ITS-Service in PS-CLM FIN-CGV-MIC Migration to new XSS-Library PS-CON Unauthorized modification in ITS-Service in PS FIN-SEM-CPM Unauthorized modification of displayed content in SEM-CPM SRM-EBP-CAT Unauthorized modification in ITS-Services in BBP EP-PIN-RTC Missing authorization check in RTC BC-WD-CMP-FPM Missing authorization check in BC-WD-CMP-FPM SRM-LA Unauthorized modification of displayed content in SRM-LA CRM-IC-FRW Unauthorized modification in BSP in CRM-IC CRM-IC-SCR Unauthorized modification in BSP in CRM-IC-SCR SRM-EBP-CGS BBP_PM01 ITS service vulnerable to XSS attack FI-AA Unauthorized modificatn of displayed content FI-AA (EA-APPL) CRM-ANA-MKT-CLV Unauthorized modification in BSP appl. in CRM-ANA-MKT-CLV CA-DMS Unauthorized modification of BSP in Webdocuments CRM-ANA Unauthorized modification of BSP in CRM-ANA SRM-EBP-PD Unauthorized modification of displayed content in SRM

12 Appendix: SAP Security Notes, May PPM-PFM Unauthorized modification of displayed content in PPM-PFM IS-A-SWP Unauthorized modification in ITS-Services in SWP CRM-IC-FCA Unauthorized modification of BSP in CRM-IC-FCA SRM-EBP-WFL Unauthorized modificat. of displayed content in SRM-EBP-WFL FIN-BA Unauthorized modification of displayed content in FIN-BA CRM-MD-BP-CCP Unauthorized modification of BSP in CRM-MD-BP-CCP SRM-EBP-PRO Unauthorized modification of stored content in SRM-EBP-PRO SRM-EBP-CA-SIG Unauthorized modification of BSP in SRM-EBP-CA-SIG CRM-IPS-BTX-APL Unauthorized modification of BSPs in CRM Grantor Management QM Unauthorized modification of ITS in QM FIN-FSCM-BD Unauthorized modification of displayed content in FSCM BD CRM-IU Unauthorized change of displayed content in CRM-IU IS-A-SWP Unauthorized modification in ITS-Services in SWP IS-OIL-DS-SSR Unauthorized modification in ITS-Service in IS-OIL-DS-SSR IS-ADEC-BOQ Unauthorized modification in ITS-Service in IS-ADEC-BOQ SRM-SUS SUS: Unauthorized modification in BSP application SRMSUS PA-PA-SG Security: XSS vulnerability in SAP GUI for HTML PPM-PRO Unauthorized modification of displayed content in PPM-PRO PA-PA-AU Security: XSS vulnerability in SAP GUI for HTML CRM-ANA-BOJ-UI Unauthorized modification of BSP in CRM-ANA-BOJ-UI CRM-MKT-ML Unauthorized modification of BSP in CRM-MKT-ML CRM-MKT-MPL Unauthorized modification of BSP in CRM-MKT-MPL CRM-MKT-MPL-TPM- TPO Unauthorized modification of displayed content in TPO CRM-MD-BP-PCU Unauthorized modification of BSP in CRM-MD-BP-PCU PA-PA-IN Security: XSS vulnerability in SAP GUI for HTML BC-SRV-BTF Unauthorized modification of displayed content in BTF-Editor CRM-IPS-ICM-CMG Unauthorized modification of displayed content in ICM CRM-MKT-MPL-CAL Unauthorized modification of display content in MKT Calendar

13 Appendix: SAP Security Notes, May SRM-EBP-ADM-USR Unauthorized modification of ITS in SRM-EBP-ADM-USR IS-HER-CM Unauthorized modification of ITS in IS-HER-CM BW-WHM Update 1 to security note PLM-CFO Update 1 to security note EPM-SA Missing Authorization check in OPMFND PP-MES Missing authorization check in PP-MES SV-SMG-SDD Code injection vulnerability in SV-SMG-SDD CRM-MW-MBX HTTP verb tampering issue in Java MapBox PE-LSO-LPO Security fix for BSP application HCM_LEARNING BC-JAS-ADM-ADM Missing authorization check in NWA BC-BMT-BRM-ENG Explicit Scope Declaration issues in BRMS-CORE

14 Layer Seven Security Layer Seven Security specialize in SAP security. We serve customers worldwide to protect information assets against internal and external threats and comply with industry and statutory reporting requirements. The company fuses technical expertise with business acumen to deliver unparalleled audit, consulting and vulnerability assessment solutions targeted at managing risks associated with contemporary SAP systems. Our consultants have an average of ten years of experience in field of SAP security and proficiency in regulatory compliance including Basel II, GLBA, HIPAA, FISMA, PIPEDA, PCI DSS and SOX. The company is privately owned and headquartered in Toronto, Canada. Address Westbury Corporate Centre Suite Upper Middle Road Oakville, Ontario L6H 0C3, Canada Web Telephone

15 Copyright Layer Seven Security 01 - All rights reserved. No portion of this document may be reproduced in whole or in part without the prior written permission of Layer Seven Security. Layer Seven Security offers no specific guarantee regarding the accuracy or completeness of the information presented, but the professional staff of Layer Seven Security makes every reasonable effort to present the most reliable information available to it and to meet or exceed any applicable industry standards. This publication contains references to the products of SAP AG. SAP, R/3, xapps, xapp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials.

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes July 01 In July, SAP released a crucial update for a vulnerability in the Archiving Workbench originally patched in February 011. Note 1561545 contains

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes June 01 After the turbulence in May, normal business seems to have been resumed at Waldorf. SAP released just 6 Security Notes in June. Furthermore, there

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes June 01 SAP released several patches for multiple vulnerabilities effecting Sybase EAServer in June. EAServer is used to create, deploy and configure Java

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes January 01 There were several Security Notes released by SAP in January for directory traversal vulnerabilities affecting a number of application areas.

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes November 01 SAP issued a critical bulletin in November to raise awareness of three Security Notes related to SAProuter and a new malware variant that is

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes September 2014 September s corrections included a number of patches for missing authorization checks in critical applications and components, most notably

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes February 01 SAP Security Notes are rarely front page news. The exception was Note 1785761 which was singled out by SAP for a call to action in the Spotlight

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes May 2015 SAP released several significant patches in May for memory corruption vulnerabilities effecting multiple applications and components. Such weaknesses

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes January 01 There were several Security Notes released by SAP in January for directory traversal vulnerabilities affecting a number of application areas.

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes March 2015 SAP released an important announcement on Patch Tuesday in March to spotlight Security Notes 2134905, 2132584, 2125513 and 2108161. The Notes

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes August 2014 SAP released a Hot News fix in August for a critical vulnerability effecting the SAP Afaria Mobile Device Management (MDM) server. Note 2044175

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes July 2015 The most significant Security Note released by SAP in July deals with a critical missing authentication and authorization check in the XP Server

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes June 2014 SAP released an important notification in June to highlight a critical vulnerability in SAP Afaria, the Sybase platform that enables centralized

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes October 2015 SAP released a batch of emergency fixes for the Download Manager (SDM) application through Notes 2235412 and 2233617 in October. The Notes

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes April 2015 The most critical patch released by SAP in April corrected a missing authentication check in Sybase Adaptive Server Enterprise (ASE). ASE is

More information

Layer Seven Security ADVISORY. SAP Security Notes

Layer Seven Security ADVISORY. SAP Security Notes Layer Seven Security ADVISORY SAP Security Notes August 2017 Note 2381071 patches a critical cross-site Ajax vulnerability in the Prototype JS library of BusinessObjects. Ajax is a method often used by

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes December 2013 SAP announced an important change to the release strategy for security patches in December. In order to respond more rapidly to externally

More information

Layer Seven Security ADVISORY

Layer Seven Security ADVISORY Layer Seven Security ADVISORY SAP Security Notes November 2014 SAP issued a total of 84 Security Notes in November. Approximately half were Support P a c k a g e N o t e s p roviding s w i t c h a b l

More information

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance

More information

SAP Security. BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0

SAP Security. BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0 Welcome BIZEC Roundtable @ IT Defense, Berlin SAP Security BIZEC APP/11 Version 2.0 BIZEC TEC/11 Version 2.0 February 1, 2013 Andreas Wiegenstein CTO, Virtual Forge 2 SAP Security SAP security is a complex

More information

About the company. What we do? Cybersecurity solutions adapted to protect enterprise business applications (SAP & Oracle).

About the company. What we do? Cybersecurity solutions adapted to protect enterprise business applications (SAP & Oracle). About the company 2 What we do? Cybersecurity solutions adapted to protect enterprise business applications (SAP & Oracle). Agenda 3 Building a business case for SAP Vulnerability Management How to start

More information

Attacks based on security configurations

Attacks based on security configurations SAP Security 2014 Protecting Your SAP Systems Against Attacks based on security configurations Juan Perez-Etchegoyen jppereze@onapsis.com March 18 th, 2014 BIZEC Workshop Disclaimer This publication is

More information

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen Etchegoyen jppereze@onapsis.com September 20 th, 2012 Ekoparty, Buenos Aires Disclaimer This publication is copyright

More information

SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide

SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide SAP BusinessObjects XI3.1 Service Pack 4 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet,

More information

SAP Branch Agreement Origination V3.703: Software and Delivery Requirements

SAP Branch Agreement Origination V3.703: Software and Delivery Requirements RDS BAO V3.703 May.2015 English Branch Agreement Origination V3.703: Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1 2 Date Copyright 2015 SE or

More information

Trigger-Based Data Replication Using SAP Landscape Transformation Replication Server

Trigger-Based Data Replication Using SAP Landscape Transformation Replication Server Installation Guide SAP Landscape Transformation Replication Server Document Version: 1.6 2017-06-14 CUSTOMER Trigger-Based Data Replication Using SAP Landscape Transformation Replication Server - For SAP

More information

Obtain Configuration Parameters for LPD_CUST Provide the base path of your BSP application (1/2)

Obtain Configuration Parameters for LPD_CUST Provide the base path of your BSP application (1/2) Preparation Obtain Configuration Parameters for LPD_CUST Provide the base path of your BSP application (1/2) 1. Reference the help for your UI5 application name 2. Launch SAP transaction SICF and enter

More information

Preventing vulnerabilities in HANAbased MARCH TROOPERS SECURITY CONFERENCE

Preventing vulnerabilities in HANAbased MARCH TROOPERS SECURITY CONFERENCE Preventing vulnerabilities in HANAbased deployments MARCH 2016 - TROOPERS SECURITY CONFERENCE Disclaimer This presentation contains references to the products of SAP SE. SAP, R/3, xapps, xapp, SAP NetWeaver,

More information

Disclosure Management US SEC. Preview

Disclosure Management US SEC. Preview Disclosure Management US SEC Preview TABLE OF CONTENT Introduction... 3 Creating the Preview... 4 Troubleshooting... 8 Alternative way of creating the Preview... 10 Useful Notes/KBAs... 14 2 Introduction

More information

Quality Inspection Engine (QIE) Security Guide

Quality Inspection Engine (QIE) Security Guide D O N. Q I E _ S E C G U I D E Quality Inspection Engine (QIE) Security Guide S AP E n h a n c e m e n t P a c k age 5 f o r S AP E R P 6. 0 Copyright Copyright 2010 SAP AG. All rights reserved. No part

More information

SAP BusinessObjects Enterprise Upgrade Guide

SAP BusinessObjects Enterprise Upgrade Guide SAP BusinessObjects Enterprise Upgrade Guide SAP BusinessObjects Enterprise XI 3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business

More information

SAP Audit Guide for Basis

SAP Audit Guide for Basis SAP Audit Guide for Basis This audit guide is designed to assist the review of middleware components that support the administration and integration of SAP applications, commonly referred to as SAP Basis.

More information

BW Text Variables of Type Replacement Path

BW Text Variables of Type Replacement Path BW Text Variables of Type Replacement Path Applies to: This article is applicable to SAP BI 7.0. For more information, visit the EDW homepage. Summary This document shows how to use and also helps in the

More information

CoreMax Consulting s Cyber Security Roadmap

CoreMax Consulting s Cyber Security Roadmap CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows

More information

How the Standard Integration between SAP EM and SAP TM Can Be Tested with SE37

How the Standard Integration between SAP EM and SAP TM Can Be Tested with SE37 How the Standard Integration between SAP EM and SAP TM Can Be Tested with SE37 Author: Daniel Härder Document Date: 04.02.2013 TABLE OF CONTENTS SUMMARY... 3 TESTING EM TM INTEGRATION WITH SE37... 3 DEFINING

More information

SAP Discovery System V5 Users and Passwords

SAP Discovery System V5 Users and Passwords SAP Discovery System V5 s and s SAP DISCOVERY SYSTEM V5 TABLE OF CONTENT SAP DISCOVERY SYSTEM USERS AND PASSWORDS... 3 PURPOSE... 3 USERS AND PASSWORDS... 3 1. OPERATING SYSTEM USERS AND PASSWORDS... 3

More information

ADM920 SAP Identity Management

ADM920 SAP Identity Management ADM920 SAP Identity Management. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced

More information

Copyright

Copyright 1 Security Test EXTRA Workshop : ANSWER THESE QUESTIONS 1. What do you consider to be the biggest security issues with mobile phones? 2. How seriously are consumers and companies taking these threats?

More information

SAP Security In-Depth

SAP Security In-Depth SAP Security In-Depth by Mariano Nunez Vol. 5 / May 2012 Abstract "SAP platforms are only accessible internally". While that was true in many organizations more than a decade ago, today, driven by modern

More information

Disclosure Management. Default font on styles in Disclosure Management

Disclosure Management. Default font on styles in Disclosure Management Disclosure Management Default font on styles in Disclosure Management DISCLOSURE MANAGEMENT DEFAULT FONT IS STYLES (V1.1) TABLE OF CONTENT Introduction... 3 An example... 3 What happens in the system...

More information

INTERNAL USE ONLY SAP BusinessObjects EPM Add-in for Microsoft Office Support Package 17 / Patch XX Installation Procedure

INTERNAL USE ONLY SAP BusinessObjects EPM Add-in for Microsoft Office Support Package 17 / Patch XX Installation Procedure SAP BusinessObjects EPM solutions, add-in for Microsoft Office Document Version: 10.0 Support Package 17 / Patch XX - 2014-03-17 INTERNAL USE ONLY SAP BusinessObjects EPM Add-in for Microsoft Office Support

More information

Web Applications Part 1 The Weak Link in Information Security Your Last Line of Defense

Web Applications Part 1 The Weak Link in Information Security Your Last Line of Defense Web Applications Part 1 The Weak Link in Information Security Your Last Line of Defense Anthony Lim MBA FCITIL CISSP CSSLP Director, Security Rational Software - Asia Pacific 1 Hong Kong 17 Nov 2009 Welcome

More information

Business Objects Integration Scenario 2

Business Objects Integration Scenario 2 SAP AG May 2010 - Prerequisites Abstract This presentation provides a step by step description how to create an Xcelsius dashboard based on a BI Query (using the SAP NetWeaver BW connection). Prerequisites

More information

SAP BusinessObjects Performance Management Deployment Tool Guide

SAP BusinessObjects Performance Management Deployment Tool Guide SAP BusinessObjects Performance Management Deployment Tool Guide SAP BusinessObjects XI 3.1 XI3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign,

More information

SAP BusinessObjects Dashboards 4.0 SAP Crystal Dashboard Design 2011 SAP Crystal Presentation Design 2011

SAP BusinessObjects Dashboards 4.0 SAP Crystal Dashboard Design 2011 SAP Crystal Presentation Design 2011 SAP BusinessObjects Dashboards 4.0 SAP Crystal Dashboard Design 2011 SAP Crystal Presentation Design 2011 August 18th, 2011 Product Availability Matrix (PAM) Dashboard Design 2011 / Presentation Design

More information

Use Business Objects Planning and Consolidation (version for the Microsoft platform) BPF services in Xcelsius

Use Business Objects Planning and Consolidation (version for the Microsoft platform) BPF services in Xcelsius How To Use Business Objects Planning and Consolidation (version for the Microsoft platform) BPF services in Xcelsius SAP Product Name: SAP Business Planning and Consolidation, version for Microsoft Applicable

More information

SAP Sybase Replication Server Change DATA Capture Configuration. Example Configuration

SAP Sybase Replication Server Change DATA Capture Configuration. Example Configuration SAP Sybase Replication Server Change DATA Capture Configuration Example Configuration TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Scope... 3 1.2 Purpose... 3 2 CONFIGURATION... 4 2.1 Requeriments... 4 2.2

More information

SAP Plant Connectivity 2.2

SAP Plant Connectivity 2.2 SAP Plant Connectivity 2.2 PCo Functions / Destinations Release 2.2 Function / Destination Bidirectional Queries Software Development Kit (SDK) for custom agents RFC Destination to EWM RFC Destination

More information

Passing Parameters via Web Dynpro Application

Passing Parameters via Web Dynpro Application Applies to: SAP ABAP Workbench that supports Web Dynpro development. For more information, visit the Web Dynpro ABAP homepage. Summary This article explains how to pass parameters via Web Dynpro Application.

More information

Using Xcelsius 2008 with SAP NetWeaver BW

Using Xcelsius 2008 with SAP NetWeaver BW Using Xcelsius 2008 with SAP NetWeaver BW Applies to: Xcelsius 2008 Enterprise Service Pack 02 (and higher) SAP NetWeaver BW 7.0 Enhancement package 01 Service Pack 05 (and higher) Summary In this short

More information

Software and Delivery Requirements

Software and Delivery Requirements SAP HANA Activity Repository rapiddeployment solution V2.10 April 2015 English SAP HANA Activity Repository rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190

More information

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management SOLUTION BRIEF CA API MANAGEMENT Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management 2 SOLUTION BRIEF ENABLE AND PROTECT YOUR WEB APPLICATIONS WITH CA API MANAGEMENT ca.com

More information

SAP Crystal Reports Viewer 2011 Release Notes

SAP Crystal Reports Viewer 2011 Release Notes SAP Crystal Reports Viewer 2011 Release Notes 07/12/2010 Copyright: 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products

More information

Quick View Insider: How Do I Set Quick View as SNC s Entry Screen?

Quick View Insider: How Do I Set Quick View as SNC s Entry Screen? Quick View Insider: How Do I Set Quick View as SNC s Entry Screen? Applies to: SAP SNC (Supply Network Collaboration) release 7.0 enhancement pack 1. SAP SNC release 7.0 For more information, visit the

More information

Message Alerting for SAP NetWeaver PI Advanced Adapter Engine Extended

Message Alerting for SAP NetWeaver PI Advanced Adapter Engine Extended Message Alerting for SAP NetWeaver PI Advanced Adapter Engine Extended Applies to SAP NetWeaver PI Advanced Adapter Engine Extended 7.30. Summary This article explains how to set up Message Alerting for

More information

Crystal Reports 2008 FixPack 2.4 Known Issues and Limitations

Crystal Reports 2008 FixPack 2.4 Known Issues and Limitations Crystal Reports 2008 FixPack 2.4 Known Issues and Limitations 1/5 Copyright Copyright 2010 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any

More information

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s) ADM960 SAP NetWeaver Application Server Security. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2013 SAP AG. All rights reserved. No part of this publication

More information

Setup an NWDI Track for Composition Environment Developments

Setup an NWDI Track for Composition Environment Developments How-to Guide SAP NetWeaver 7.0 How To Setup an NWDI Track for Composition Environment Developments Version 2.00 January 2008 Applicable Releases: SAP NetWeaver 7.0 SP13 (Custom Development & Unified Life-Cycle

More information

Sizing SAP Master Data Governance 9.0

Sizing SAP Master Data Governance 9.0 Sizing Guide Document Version: 1.0 2016-12-14 Disclaimer Some components of this product are based on Java. Any code change in these components may cause unpredictable and severe malfunctions and is therefore

More information

ADM950. Secure SAP System Management COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

ADM950. Secure SAP System Management COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s) ADM950 Secure SAP System Management. COURSE OUTLINE Course Version: 15 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2015 SAP SE. All rights reserved. No part of this publication may be reproduced

More information

UI Changes for SAP Portfolio and Project Management Depending on NW Release

UI Changes for SAP Portfolio and Project Management Depending on NW Release UI Changes for SAP Portfolio and Project Management Depending on NW Release TABLE OF CONTENTS CHANGES IN RENDERING OF SAP PORTF. AND PROJ MGMT. WITH UI GUIDELINE 2.0... 3 Toolbars in Tables... 3 Toolbars

More information

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt Excerpts of Web Application Security focusing on Data Validation adapted for F.I.S.T. 2004, Frankfurt by fs Purpose of this course: 1. Relate to WA s and get a basic understanding of them 2. Understand

More information

Dashboards Batch Utility User Guide

Dashboards Batch Utility User Guide Dashboards Batch Utility User Guide Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and

More information

Solutions Business Manager Web Application Security Assessment

Solutions Business Manager Web Application Security Assessment White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security

More information

SAP Directory Content Migration Tool

SAP Directory Content Migration Tool This document describes SAP directory content migration which is used for migration and mass change functionality for PI scenarios and channels from Dual Stack to Single Stack system. This document explains

More information

SAP Afaria Post- Installation Part 1

SAP Afaria Post- Installation Part 1 SAP Afaria 6.6FP1 March 2011 English Version 1.1 {03/29/2011:Changed the header to: Afaria Post- Installation Shival Tailor} SAP Afaria Post- Installation Part 1 Document for Afaria Post - Installation

More information

How to Setup Notifications in Fiori 2.0 Step-by-Step

How to Setup Notifications in Fiori 2.0 Step-by-Step How to Setup Notifications in Fiori 2.0 Step-by-Step SAP S/4HANA 1610 Wilson Wei 2017 SAP AG. All rights reserved. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork,

More information

Cyber Security Audit & Roadmap Business Process and

Cyber Security Audit & Roadmap Business Process and Cyber Security Audit & Roadmap Business Process and Organizations planning for a security assessment have to juggle many competing priorities. They are struggling to become compliant, and stay compliant,

More information

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall F5 White Paper Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall Organizations need an end-to-end web application and database security solution to protect data, customers,

More information

Different Types of iviews in Enterprise Portal 7.0

Different Types of iviews in Enterprise Portal 7.0 Different Types of iviews in Enterprise Portal 7.0 Applies to: This Article applies to Enterprise Portal 7.0. For more information, visit the Portal and Collaboration homepage. Summary This document covers

More information

SAP BusinessObjects Dashboards 4.0 SP04 SAP Crystal Dashboard Design 2011 SP04 SAP Crystal Presentation Design 2011 SP04

SAP BusinessObjects Dashboards 4.0 SP04 SAP Crystal Dashboard Design 2011 SP04 SAP Crystal Presentation Design 2011 SP04 SAP BusinessObjects Dashboards 4.0 SP04 SAP Crystal Dashboard Design 2011 SP04 SAP Crystal Presentation Design 2011 SP04 Product Availability Matrix (PAM) June 29th, 2012 SAP BusinessObjects Dashboards

More information

Cube Designer User Guide SAP BusinessObjects Financial Consolidation, Cube Designer 10.0

Cube Designer User Guide SAP BusinessObjects Financial Consolidation, Cube Designer 10.0 Cube Designer User Guide SAP BusinessObjects Financial Consolidation, Cube Designer 10.0 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects

More information

How to Use Context Menus in a Web Dynpro for Java Application

How to Use Context Menus in a Web Dynpro for Java Application How to Use Context Menus in a Web Dynpro for Java Application Applies to: Web Dynpro for Java 7.11. For more information, visit the Web Dynpro Java homepage. Summary This tutorial explains the Web Dynpro

More information

SAP Landscape Transformation for SAP HANA (HA1)

SAP Landscape Transformation for SAP HANA (HA1) SAP HANA 1.0 SP05 SAP Landscape Transformation SP04 October 2013 English SAP Landscape Transformation for SAP HANA (HA1) Building Block Configuration Guide SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany

More information

How to Integrate Microsoft Bing Maps into SAP EHS Management

How to Integrate Microsoft Bing Maps into SAP EHS Management How to Integrate Microsoft Bing Maps into SAP EHS Management Applies to: Component Extension 1.0 for SAP Environment, Health, and Safety Management. For more information, visit the Sustainability homepage.

More information

How to Set Up and Use Electronic Tax Reporting

How to Set Up and Use Electronic Tax Reporting How-To Guide SAP Business One 8.82 PL09 and higher Document Version: 1.0 2012-10-01 Country: Netherlands Typographic Conventions Type Style Example Description Words or characters quoted from the screen.

More information

Data Handling in the SAP NetWeaver System Landscape Directory Step by Step

Data Handling in the SAP NetWeaver System Landscape Directory Step by Step Data Handling in the SAP NetWeaver System Landscape Directory Step by Step Applies to: SAP NetWeaver System Landscape Directory (SLD). In this document all main SLD's mechanisms to retrieve and distribute

More information

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day ADM960 SAP NetWeaver Application Server Security. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day SAP Copyrights and Trademarks 2015 SAP SE. All rights reserved. No part of this publication may

More information

Visual Composer for SAP NetWeaver Composition Environment - Connectors

Visual Composer for SAP NetWeaver Composition Environment - Connectors Visual Composer for SAP NetWeaver Composition Environment - Connectors Applies to: Visual Composer for SAP enhancement package 1 for SAP NetWeaver Composition Environment 7.1 For more information, visit

More information

How to Find Suitable Enhancements in SAP Standard Applications

How to Find Suitable Enhancements in SAP Standard Applications How to Find Suitable Enhancements in SAP Standard Applications Applies to: User Exits, Customer Exits, Business Add-Ins. For more information, visit the ABAP homepage. Summary ABAP developers will often

More information

Automatic Deletion of Similar/Identical Requests from InfoCube after Update

Automatic Deletion of Similar/Identical Requests from InfoCube after Update Automatic Deletion of Similar/Identical Requests from InfoCube after Update Applies to: SAP BW 3.5/Business Intelligence 7.0 Summary This document explains the concept of automatic deletion of the overlapping

More information

Create and run apps on HANA Cloud in SAP River RDE

Create and run apps on HANA Cloud in SAP River RDE SAP River Rapid Development Environment How-To Guide Provided by Customer Experience Group Create and run apps on HANA Cloud in SAP River RDE Applicable Releases: SAP River Rapid Development Environment

More information

Scott Lowden SAP America Technical Solution Architect

Scott Lowden SAP America Technical Solution Architect SAP NetWeaver Training Overview - SAP Web Application Server Scott Lowden SAP America Technical Solution Architect SAP NetWeaver Components Detail SAP Web Application Server SAP AG 2003, Title of Presentation,

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

Implementing Business Objects in CAF and Developing Web Dynpro Application

Implementing Business Objects in CAF and Developing Web Dynpro Application Implementing Business Objects in CAF and Developing Web Dynpro Application Applies to: SAP Net Weaver CE 7.1.1 EHP1 (SP0, SP1, SP2 sand SP3). For more information, visit the Web Dynpro Java homepage. Summary

More information

Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006

Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006 How-to Guide SAP NetWeaver 04s How To Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006 Applicable Releases: SAP NetWeaver 04s SPS07 or greater Copyright 2006 SAP AG. All rights

More information

Portal Integration Kit User's Guide for SAP BusinessObjects Portlets

Portal Integration Kit User's Guide for SAP BusinessObjects Portlets Portal Integration Kit User's Guide for SAP BusinessObjects Portlets SAP BusinessObjects Enterprise XI 3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge,

More information

EP350. Innovated Content Management and Collaboration COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

EP350. Innovated Content Management and Collaboration COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s) EP350 Innovated Content Management and Collaboration. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication

More information

ORACLE USER PRODUCTIVITY KIT PROFESSIONAL V6.3 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3)

ORACLE USER PRODUCTIVITY KIT PROFESSIONAL V6.3 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3) ORACLE USER PRODUCTIVITY KIT PROFESSIONAL V6.3 TECHNICAL SPECIFICATIONS (WITH ENABLEMENT SERVICE PACK 3) KEY FEATURES FEATURES OF ORACLE USER PRODUCTIVITY KIT Single, synchronized authoring session for

More information

Functional Upgrade NetWeaver 7.0 BI - Java

Functional Upgrade NetWeaver 7.0 BI - Java DSAG - JAHRESKONGRESS `07 Functional Upgrade NetWeaver 7.0 BI - Java Roland Kramer, Platform Advisor, Office of the CTO EMEA, SAP AG Business Intelligence with SAP NetWeaver 7.0 DSAG-Jahreskongress 2007,

More information

Information Design Tool User Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 4

Information Design Tool User Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 4 Information Design Tool User Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 4 Copyright 2012 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign,

More information

BC400 Introduction to the ABAP Workbench

BC400 Introduction to the ABAP Workbench BC400 Introduction to the ABAP Workbench. COURSE OUTLINE Course Version: 10 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be

More information

Architecture Figure 3.

Architecture Figure 3. The popularity of SAP EP and its availability on the Internet makes it a desirable entry point for hackers who are choosing the spot to attack companies of various size and industry. Let s take a look

More information

Visual Business Configuration with SAP TM

Visual Business Configuration with SAP TM SAP Transportation Management Visual Business Configuration with SAP TM CUSTOMER Document Version: 3.0 December 2013 SAP AG 1 Copyright Copyright 2013 SAP AG. All rights reserved. SAP Library document

More information

MCAFEE FOUNDSTONE FSL UPDATE

MCAFEE FOUNDSTONE FSL UPDATE 2018-JAN-15 FSL version 7.5.994 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary

More information

Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment

Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment SAP HANA 1.0 Predictive Analysis 1.0 August 2013 English Quick Guide to Implementing SAP Predictive Analytics Content Adoption rapiddeployment solution for Retail (EN) SAP AG Dietmar-Hopp-Allee 16 69190

More information

C1: Define Security Requirements

C1: Define Security Requirements OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security

More information

Building a Real-time Dashboard using Xcelsius and Data Integrator

Building a Real-time Dashboard using Xcelsius and Data Integrator Building a Real-time Dashboard using Xcelsius and Data Integrator Applies to: BusinessObjects Data Integrator XI (11.7) Summary This white paper shows how to use certain features of Data Integrator (DI)

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

Quick View Insider: How Can I Change the Colors? (SNC 7.0)

Quick View Insider: How Can I Change the Colors? (SNC 7.0) Quick View Insider: How Can I Change the Colors? (SNC 7.0) Applies to: SAP SNC (Supply Network Collaboration) release 7.0 For more information, visit the Supply Chain Management homepage. Summary This

More information