An attacker can exploit TREX/BWA and use specially crafted inputs to execute OS commands on the TREX/BWA server(s).
TREXRFCServer.ini, rfc server configuration file deleted, ini file delete, unexpected file deletion, TREX, Search , KBA , BC-TRX , TREX , How To
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP ONE Support launchpad (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.