SAP Sourcing can be abused by a malicious user allowing them to upload potentially malicious files resulting in undesired system behavior.
KBA , SRM-ESO-IEX , Import and Export for SAP Sourcing & CLM , How To
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.