An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Security researchers SecurityBridge, who notified SAP after finding the flaw, described as a “missing input sanitation” ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results