An attacker can exploit TREX/BWA and use specially crafted inputs to execute OS commands on the TREX/BWA server(s).
TREXRFCServer.ini, rfc server configuration file deleted, ini file delete, unexpected file deletion, TREX, Search , KBA , BC-TRX , TREX , How To
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.