Page 87 - Cyber Defense eMagazine April 2023
P. 87

SAP Debugger’s Power and Danger


             By Christoph Nagy, CEO of SecurityBridge





            It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol
            (“SAP”) representative explained a recently corrected vulnerability. The correction did not remove the
            problematic code but only introduced an additional check. Which, in my opinion, is the normal procedure.
            However, after the explanation by the SAP speaker, an interposed question came from the audience.
            The question was: How does the fix protect against attackers who use SAP Debugger to skip the check?
            In  response,  the  spokesperson  vehemently  emphasized  that  an  SAP  system  in  which  users  have
            debugging  privileges  (coupled  with  changes  to  program  variables);  cannot  be  protected  from
            compromise.

             The combination of the debugger authorization with the said possibility to change the program variables
            is called, in SAP lingo, Debug & Change. To support the statement of the SAP expert, let's look at: What
            is the SAP Debugger? and What can it do to the system?















































                                                                                                              87
   82   83   84   85   86   87   88   89   90   91   92