Ansicht
Dokumentation

ABENSYSTEM_DEPENDENT_SCRTY - SYSTEM DEPENDENT SCRTY

ABENSYSTEM_DEPENDENT_SCRTY - SYSTEM DEPENDENT SCRTY

PERFORM Short Reference   SUBST_MERGE_LIST - merge external lists to one complete list with #if... logic for R3up  
This documentation is copyright by SAP AG.
SAP E-Book

System-Dependent Program Flow

The use of the following system fields in ABAP programs to control program behavior can be a security risk:

  • sy-host
  • sy-sysid
  • sy-mandt

As a user-specific program flow, it may in the worst case constitute a real back door that can be used by developers to access unauthorized data or functions in systems where they do not have authorization. On the other hand, these can also be code sections used for test purposes during development and then forgotten. Generally speaking, source code that depends on the above system fields should always be avoided and removed. Instead, suitable APIs or fully separate implementations should be used. In cases where the use of the above system fields in logical expressions is absolutely necessary, a special exemption must be granted for the program, so that it can pass the appropriate security tests.

It is possible to define additional system fields, for which this check is performed, by implementing BAdI SLIN_BADI_SEC_BACKDOOR.






Vendor Master (General Section)   Fill RESBD Structure from EBP Component Structure  
This documentation is copyright by SAP AG.

Length: 1441 Date: 20240420 Time: 022226     sap01-206 ( 34 ms )