SAP Sourcing can be abused by a malicious user allowing them to upload potentially malicious files resulting in undesired system behavior.
KBA , SRM-ESO-IEX , Import and Export for SAP Sourcing & CLM , How To
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.