Instruction
stringclasses 1
value | Input
stringlengths 79
33k
| Response
stringlengths 106
9.29k
| __index_level_0__
int64 0
2.83k
|
---|---|---|---|
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS ZCL_ZOSQL_DB_LAYER IMPLEMENTATION.
method ZIF_ZOSQL_DB_LAYER~COMMIT.
IF iv_wait = abap_true.
COMMIT WORK AND WAIT.
ELSE.
COMMIT WORK.
ENDIF.
endmethod.
method ZIF_ZOSQL_DB_LAYER~DELETE.
DATA: lv_table_name TYPE string,
lv_where TYPE string,
lv_new_syntax TYPE abap_bool,
lo_sql_parser TYPE REF TO zcl_zosql_parser_recurs_desc.
_split_delete_into_parts( EXPORTING iv_delete_statement = iv_delete_statement
IMPORTING ev_table_name = lv_table_name
ev_where = lv_where
ev_new_syntax = lv_new_syntax
eo_sql_parser = lo_sql_parser ).
_delete_by_sql_parts( iv_table_name = lv_table_name
iv_where = lv_where
iv_new_syntax = lv_new_syntax
it_parameters = it_parameters
io_sql_parser = lo_sql_parser ).
endmethod.
method ZIF_ZOSQL_DB_LAYER~DELETE_BY_ITAB.
DATA: ld_itab_for_db_operation TYPE REF TO data,
lv_table_name TYPE tabname.
FIELD-SYMBOLS: <lt_itab_for_db_operation> TYPE STANDARD TABLE.
lv_table_name = iv_table_name.
IF lv_table_name IS INITIAL.
lv_table_name = zcl_zosql_utils=>try_to_guess_tabname_by_data( it_lines_for_delete ).
ENDIF.
ld_itab_for_db_operation = _convert_itab_for_db_operation( iv_table_name = lv_table_name
it_input_itab = it_lines_for_delete ).
ASSIGN ld_itab_for_db_operation->* TO <lt_itab_for_db_operation>.
DELETE (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
endmethod.
method ZIF_ZOSQL_DB_LAYER~FETCH_NEXT_CURSOR.
FIELD-SYMBOLS: <ls_cursor_parameters> LIKE LINE OF mt_database_cursor_parameters,
<lt_result_set> TYPE STANDARD TABLE,
<lt_result_of_method> TYPE STANDARD TABLE.
READ TABLE mt_database_cursor_parameters WITH KEY cursor = iv_cursor
ASSIGNING <ls_cursor_parameters>.
IF sy-subrc <> 0.
ev_subrc = 4.
RETURN.
ENDIF.
ASSIGN <ls_cursor_parameters>-ref_to_result_dataset->* TO <lt_result_set>.
CREATE DATA ed_result_as_table LIKE <lt_result_set>.
ASSIGN ed_result_as_table->* TO <lt_result_of_method>.
zif_zosql_db_layer~fetch_next_cursor_to_itab( EXPORTING iv_cursor = iv_cursor
iv_package_size = iv_package_size
IMPORTING et_result_table = <lt_result_of_method>
ev_subrc = ev_subrc ).
endmethod.
method ZIF_ZOSQL_DB_LAYER~FETCH_NEXT_CURSOR_TO_ITAB.
DATA: lt_dummy_table TYPE TABLE OF t000.
FIELD-SYMBOLS: <lt_result_table> TYPE any table.
IF if_table_consists_of_structs( et_result_table ) = abap_true.
ASSIGN et_result_table TO <lt_result_table>.
ELSE.
ASSIGN lt_dummy_table TO <lt_result_table>.
ENDIF.
IF iv_do_into_corresponding = abap_true.
FETCH NEXT CURSOR iv_cursor
INTO CORRESPONDING FIELDS OF TABLE <lt_result_table>
PACKAGE SIZE iv_package_size.
ELSE.
FETCH NEXT CURSOR iv_cursor
INTO TABLE <lt_result_table>
PACKAGE SIZE iv_package_size.
ENDIF.
ev_subrc = sy-subrc.
endmethod.
method ZIF_ZOSQL_DB_LAYER~INSERT_BY_ITAB.
DATA: ld_itab_for_db_operation TYPE REF TO data,
lv_table_name TYPE tabname.
FIELD-SYMBOLS: <lt_itab_for_db_operation> TYPE STANDARD TABLE.
lv_table_name = iv_table_name.
IF lv_table_name IS INITIAL.
lv_table_name = zcl_zosql_utils=>try_to_guess_tabname_by_data( it_new_lines ).
ENDIF.
ld_itab_for_db_operation = _convert_itab_for_db_operation( iv_table_name = lv_table_name
it_input_itab = it_new_lines ).
ASSIGN ld_itab_for_db_operation->* TO <lt_itab_for_db_operation>.
INSERT (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
endmethod.
method ZIF_ZOSQL_DB_LAYER~MODIFY_BY_ITAB.
DATA: ld_itab_for_db_operation TYPE REF TO data,
lv_table_name TYPE tabname.
FIELD-SYMBOLS: <lt_itab_for_db_operation> TYPE STANDARD TABLE.
lv_table_name = iv_table_name.
IF lv_table_name IS INITIAL.
lv_table_name = zcl_zosql_utils=>try_to_guess_tabname_by_data( it_lines_for_modify ).
ENDIF.
ld_itab_for_db_operation = _convert_itab_for_db_operation( iv_table_name = lv_table_name
it_input_itab = it_lines_for_modify ).
ASSIGN ld_itab_for_db_operation->* TO <lt_itab_for_db_operation>.
MODIFY (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
endmethod.
method ZIF_ZOSQL_DB_LAYER~OPEN_CURSOR.
DATA: lv_select_field_list TYPE string,
lv_from TYPE string,
lv_for_all_entries_tabname TYPE string,
lv_where TYPE string,
lv_group_by TYPE string,
lv_order_by TYPE string,
lv_distinct TYPE abap_bool,
lv_new_syntax TYPE abap_bool,
lv_number_of_rows_expr TYPE string,
lv_from_ready_for_select TYPE string,
lv_where_ready_for_select TYPE string,
ld_struct_with_params TYPE REF TO data,
ld_result_table_prepared TYPE REF TO data,
lv_number_of_rows_to_select TYPE i,
ls_cursor_parameters TYPE ty_database_cursor_parameters,
lo_sql_parser TYPE REF TO zcl_zosql_parser_recurs_desc.
FIELD-SYMBOLS: <ls_result_first_line> TYPE any,
<ls_struct_with_params> TYPE any,
<lt_result_table> TYPE ANY TABLE.
_split_select_into_parts( EXPORTING iv_select = iv_select
IMPORTING ev_select_field_list = lv_select_field_list
ev_from = lv_from
ev_for_all_entries_tabname = lv_for_all_entries_tabname
ev_where = lv_where
ev_group_by = lv_group_by
ev_order_by = lv_order_by
ev_distinct = lv_distinct
ev_new_syntax = lv_new_syntax
ev_number_of_rows_expr = lv_number_of_rows_expr
eo_sql_parser = lo_sql_parser ).
lv_from_ready_for_select = lv_from.
lv_where_ready_for_select = lv_where.
_prepare_for_select( EXPORTING it_parameters = it_parameters
iv_name_of_struct_with_params = 'IS_DYNAMIC_STRUCT_WITH_PARAMS'
iv_name_of_for_all_ent_in_sel = lv_for_all_entries_tabname
iv_name_of_for_all_ent_var = 'IT_FOR_ALL_ENTRIES_TABLE'
iv_new_syntax = lv_new_syntax
iv_number_of_rows_expr = lv_number_of_rows_expr
io_sql_parser = lo_sql_parser
IMPORTING ed_dynamic_struct_with_params = ld_struct_with_params
ev_number_of_rows_to_select = lv_number_of_rows_to_select
CHANGING cv_from = lv_from_ready_for_select
cv_where = lv_where_ready_for_select
).
ASSIGN ld_struct_with_params->* TO <ls_struct_with_params>.
rv_cursor = _open_cursor( iv_select = lv_select_field_list
iv_from = lv_from_ready_for_select
iv_where = lv_where_ready_for_select
iv_group_by = lv_group_by
iv_order_by = lv_order_by
iv_distinct = lv_distinct
iv_new_syntax = lv_new_syntax
it_for_all_entries_table = it_for_all_entries_table
is_dynamic_struct_with_params = <ls_struct_with_params>
iv_number_of_rows_to_select = lv_number_of_rows_to_select ).
ls_cursor_parameters-cursor = rv_cursor.
ls_cursor_parameters-ref_to_result_dataset =
create_dynamic_tab_for_result( lo_sql_parser ).
APPEND ls_cursor_parameters TO mt_database_cursor_parameters.
endmethod.
method ZIF_ZOSQL_DB_LAYER~SELECT_TO_ITAB.
DATA: lv_select_field_list TYPE string,
lv_from TYPE string,
lv_for_all_entries_tabname TYPE string,
lv_where TYPE string,
lv_group_by TYPE string,
lv_order_by TYPE string,
lv_distinct TYPE abap_bool,
lv_new_syntax TYPE abap_bool,
lv_number_of_rows_expr TYPE string,
lo_sql_parser TYPE REF TO zcl_zosql_parser_recurs_desc.
_split_select_into_parts( EXPORTING iv_select = iv_select
IMPORTING ev_select_field_list = lv_select_field_list
ev_from = lv_from
ev_for_all_entries_tabname = lv_for_all_entries_tabname
ev_where = lv_where
ev_group_by = lv_group_by
ev_order_by = lv_order_by
ev_distinct = lv_distinct
ev_new_syntax = lv_new_syntax
ev_number_of_rows_expr = lv_number_of_rows_expr
eo_sql_parser = lo_sql_parser ).
_select_by_sql_parts( EXPORTING iv_select = lv_select_field_list
iv_from = lv_from
iv_where = lv_where
iv_group_by = lv_group_by
iv_order_by = lv_order_by
iv_distinct = lv_distinct
iv_new_syntax = lv_new_syntax
it_parameters = it_parameters
it_for_all_entries_table = it_for_all_entries_table
iv_for_all_entries_tabname = lv_for_all_entries_tabname
iv_do_into_corresponding = iv_do_into_corresponding
iv_number_of_rows_expr = lv_number_of_rows_expr
io_sql_parser = lo_sql_parser
IMPORTING et_result_table = et_result_table
es_result_line = es_result_line
ev_subrc = ev_subrc ).
endmethod.
METHOD zif_zosql_db_layer~update.
DATA: lv_table_name TYPE string,
lv_set_statement TYPE string,
lv_where TYPE string,
lv_new_syntax TYPE abap_bool,
lo_sql_parser TYPE REF TO zcl_zosql_parser_recurs_desc.
_split_update_into_parts( EXPORTING iv_update_statement = iv_update_statement
IMPORTING ev_table_name = lv_table_name
ev_set_statement = lv_set_statement
ev_where = lv_where
ev_new_syntax = lv_new_syntax
eo_sql_parser = lo_sql_parser ).
_update_by_sql_parts( iv_table_name = lv_table_name
iv_set_statement = lv_set_statement
iv_where = lv_where
iv_new_syntax = lv_new_syntax
it_parameters = it_parameters
io_sql_parser = lo_sql_parser ).
ENDMETHOD.
method ZIF_ZOSQL_DB_LAYER~UPDATE_BY_ITAB.
DATA: ld_itab_for_db_operation TYPE REF TO data,
lv_table_name TYPE tabname.
FIELD-SYMBOLS: <lt_itab_for_db_operation> TYPE STANDARD TABLE.
lv_table_name = iv_table_name.
IF lv_table_name IS INITIAL.
lv_table_name = zcl_zosql_utils=>try_to_guess_tabname_by_data( it_lines_for_update ).
ENDIF.
ld_itab_for_db_operation = _convert_itab_for_db_operation( iv_table_name = lv_table_name
it_input_itab = it_lines_for_update ).
ASSIGN ld_itab_for_db_operation->* TO <lt_itab_for_db_operation>.
UPDATE (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
endmethod.
method _CHECK_COMP_NAME_UNIQUE.
```
|
I found vulnerabilities in the line:
```abap
DELETE (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
```abap
INSERT (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
```abap
MODIFY (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
```abap
UPDATE (lv_table_name) FROM TABLE <lt_itab_for_db_operation>.
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
| 2,780 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
method wait_for_free_dialog.
"hardcoded 3 on purpose. Less than that and systems get weird.
data num_free_dia_wps type i.
data num_wps type i.
constants opcode_wp_get_info type x value 25.
call 'ThWpInfo'
id 'OPCODE' field opcode_wp_get_info
id 'WP' field num_wps
id 'FREE_DIAWP' field num_free_dia_wps.
while num_free_dia_wps < 3.
"can lead to starvation if server usage is too high for too long
wait up to gc_wait_period_interval seconds.
call 'ThWpInfo'
id 'OPCODE' field opcode_wp_get_info
id 'WP' field num_wps
id 'FREE_DIAWP' field num_free_dia_wps.
endwhile.
endmethod.
```
|
I found vulnerabilities in the line:
```abap
constants opcode_wp_get_info type x value 25.
call 'ThWpInfo' * <-- There is a problem here
id 'OPCODE' field opcode_wp_get_info
id 'WP' field num_wps
```
Explanation: Potential dangerous statement KERNEL CALL.
| 2,792 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
while num_free_dia_wps < 3.
"can lead to starvation if server usage is too high for too long
wait up to gc_wait_period_interval seconds.
call 'ThWpInfo'
id 'OPCODE' field opcode_wp_get_info
id 'WP' field num_wps
id 'FREE_DIAWP' field num_free_dia_wps.
endwhile.
```
|
I found vulnerabilities in the line:
```abap
wait up to gc_wait_period_interval seconds.
call 'ThWpInfo' * <-- There is a problem here
id 'OPCODE' field opcode_wp_get_info
```
Explanation: Potential dangerous statement KERNEL CALL.
| 2,793 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
IF fw_display = space.
GENERATE SUBROUTINE POOL lt_code_string NAME fw_program.
ELSE.
```
|
I found vulnerabilities in the line:
```abap
ENDIF.
IF fw_display = space.
GENERATE SUBROUTINE POOL lt_code_string NAME fw_program. * <-- There is a problem here
ELSE.
IF lw_mess IS NOT INITIAL.
lw_explicit = lw_line.
```
Explanation: Potential dangerous statement GENERATE SUBROUTINE.
```abap
ENDIF.
IF fw_display = space.
GENERATE SUBROUTINE POOL lt_code_string NAME fw_program. * <-- There is a problem here
ELSE.
IF lw_mess IS NOT INITIAL.
lw_explicit = lw_line.
```
Explanation: Potential dangerous statement GENERATE SUBROUTINE.
| 2,794 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
FORM query_process_native USING fw_command TYPE string.
DATA : lw_lines TYPE i,
lw_sql_code TYPE i,
lw_sql_msg(255) TYPE c,
lw_row_num TYPE i,
lw_command(255) TYPE c,
lw_msg TYPE string,
lw_timestart TYPE timestampl,
lw_timeend TYPE timestampl,
lw_time TYPE p LENGTH 8 DECIMALS 2,
lw_charnumb(12) TYPE c,
lw_answer(1) TYPE c.
* Have a user confirmation before execute Native SQL Command
CONCATENATE 'Are you sure you want to do a'(m31) fw_command
'?'(m33)
INTO lw_msg SEPARATED BY space.
CALL FUNCTION 'POPUP_TO_CONFIRM'
EXPORTING
titlebar = 'Warning : critical operation'(t04)
text_question = lw_msg
default_button = '2'
display_cancel_button = space
IMPORTING
answer = lw_answer
EXCEPTIONS
text_not_found = 1
OTHERS = 2.
IF sy-subrc NE 0 OR lw_answer NE '1'.
RETURN.
ENDIF.
lw_command = fw_command.
lw_lines = strlen( lw_command ).
GET TIME STAMP FIELD lw_timestart.
CALL 'C_DB_EXECUTE'
ID 'STATLEN' FIELD lw_lines
ID 'STATTXT' FIELD lw_command
ID 'SQLERR' FIELD lw_sql_code
ID 'ERRTXT' FIELD lw_sql_msg
ID 'ROWNUM' FIELD lw_row_num.
IF sy-subrc NE 0.
MESSAGE lw_sql_msg TYPE c_msg_success DISPLAY LIKE c_msg_error.
RETURN.
ELSE.
GET TIME STAMP FIELD lw_timeend.
lw_time = cl_abap_tstmp=>subtract(
tstmp1 = lw_timeend
tstmp2 = lw_timestart
).
lw_charnumb = lw_time.
CONCATENATE 'Query executed in'(m09) lw_charnumb 'seconds.'(m10)
INTO lw_msg SEPARATED BY space.
CONDENSE lw_msg.
MESSAGE lw_msg TYPE c_msg_success.
ENDIF.
ENDFORM. " QUERY_PROCESS_NATIVE
```
|
I found vulnerabilities in the line:
```abap
CALL 'C_DB_EXECUTE'
```
Explanation: Potential dangerous statement KERNEL CALL.
| 2,795 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
FORM ddic_add_tree_zspro.
DATA : lo_zspro TYPE REF TO data,
ls_node LIKE LINE OF s_tab_active-t_node_ddic,
ls_item LIKE LINE OF s_tab_active-t_item_ddic,
lw_nodekey TYPE tv_nodekey,
BEGIN OF ls_ddic_fields,
tabname TYPE dd03l-tabname,
fieldname TYPE dd03l-fieldname,
position TYPE dd03l-position,
keyflag TYPE dd03l-keyflag,
ddtext1 TYPE dd03t-ddtext,
ddtext2 TYPE dd04t-ddtext,
END OF ls_ddic_fields,
lt_ddic_fields LIKE TABLE OF ls_ddic_fields,
lw_node_number(11) TYPE n,
lw_found(1) TYPE c.
CONSTANTS lc_zspro(30) TYPE c VALUE 'ZSPRO'.
FIELD-SYMBOLS : <ft_zspro> TYPE standard table,
<fs_zspro> TYPE any,
<fw_zspro> TYPE any.
REFRESH : t_node_zspro, t_item_zspro.
* Try to create zspro internal table
TRY.
CREATE DATA lo_zspro TYPE TABLE OF (lc_zspro).
CATCH cx_sy_create_data_error.
* If ZSPRO does not exist, leave the subroutine
RETURN.
ENDTRY.
ASSIGN lo_zspro->* TO <ft_zspro>.
* Get all data from ZSPRO (node or table entry)
SELECT * FROM (lc_zspro)
INTO TABLE <ft_zspro>
WHERE nodetype = 0
OR nodetype = 1
OR nodetype = space
ORDER BY relatkey sort.
* If ZSPRO does not contain any valuable data, leave the subroutine
IF sy-subrc NE 0.
RETURN.
ENDIF.
* Get field list for each table
LOOP AT <ft_zspro> ASSIGNING <fs_zspro>.
ASSIGN COMPONENT 'NODETYPE' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
IF sy-subrc NE 0 OR <fw_zspro> NE 1.
CONTINUE.
ENDIF.
ASSIGN COMPONENT 'NODEPARAM' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
IF sy-subrc = 0.
ls_ddic_fields-tabname = <fw_zspro>.
APPEND ls_ddic_fields TO lt_ddic_fields.
ENDIF.
ENDLOOP.
IF NOT lt_ddic_fields IS INITIAL.
SELECT dd03l~tabname dd03l~fieldname dd03l~position
dd03l~keyflag dd03t~ddtext dd04t~ddtext
INTO TABLE lt_ddic_fields
FROM dd03l
LEFT OUTER JOIN dd03t
ON dd03l~tabname = dd03t~tabname
AND dd03l~fieldname = dd03t~fieldname
AND dd03l~as4local = dd03t~as4local
AND dd03t~ddlanguage = sy-langu
LEFT OUTER JOIN dd04t
ON dd03l~rollname = dd04t~rollname
AND dd03l~as4local = dd04t~as4local
AND dd04t~ddlanguage = sy-langu
FOR ALL ENTRIES IN lt_ddic_fields
WHERE dd03l~tabname = lt_ddic_fields-tabname
AND dd03l~as4local = c_vers_active
AND dd03l~as4vers = space
AND ( dd03l~comptype = c_ddic_dtelm
OR dd03l~comptype = space ).
SORT lt_ddic_fields BY tabname keyflag DESCENDING position.
DELETE ADJACENT DUPLICATES FROM lt_ddic_fields
COMPARING tabname fieldname.
ENDIF.
CLEAR ls_node.
ls_node-node_key = 'ZSPRO'.
ls_node-isfolder = abap_true.
ls_node-expander = abap_true.
APPEND ls_node TO t_node_zspro.
CLEAR ls_item.
ls_item-node_key = 'ZSPRO'.
ls_item-class = cl_gui_column_tree=>item_class_text.
ls_item-item_name = c_ddic_col1.
ls_item-text = 'ZSPRO'.
APPEND ls_item TO t_item_zspro.
ls_item-item_name = c_ddic_col2.
ls_item-text = space.
APPEND ls_item TO t_item_zspro.
LOOP AT <ft_zspro> ASSIGNING <fs_zspro>.
ASSIGN COMPONENT 'NODE_KEY' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
CONCATENATE 'Z' <fw_zspro>+1 INTO lw_nodekey.
CLEAR ls_node.
ls_node-node_key = lw_nodekey.
ASSIGN COMPONENT 'RELATKEY' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
IF <fw_zspro> IS INITIAL.
ls_node-relatkey = 'ZSPRO'.
ELSE.
CONCATENATE 'Z' <fw_zspro>+1 INTO ls_node-relatkey.
ENDIF.
ls_node-isfolder = abap_true.
ASSIGN COMPONENT 'NODETYPE' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
IF <fw_zspro> = 1. "table entry
ls_node-n_image = '@PO@'.
ls_node-exp_image = '@PO@'.
ENDIF.
ls_node-expander = abap_true.
APPEND ls_node TO t_node_zspro.
CLEAR ls_item.
ls_item-node_key = lw_nodekey.
ls_item-class = cl_gui_column_tree=>item_class_text.
ls_item-item_name = c_ddic_col1.
IF <fw_zspro> = 1. "table entry
ASSIGN COMPONENT 'NODEPARAM' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
ls_item-text = <fw_zspro>.
ELSE.
ASSIGN COMPONENT 'TEXT' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
ls_item-text = <fw_zspro>.
ENDIF.
APPEND ls_item TO t_item_zspro.
ls_item-item_name = c_ddic_col2.
ASSIGN COMPONENT 'NODETYPE' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
IF <fw_zspro> = 1. "table entry
ASSIGN COMPONENT 'TEXT' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
ls_item-text = <fw_zspro>.
ELSE.
ls_item-text = space.
ENDIF.
APPEND ls_item TO t_item_zspro.
* For each table entry, add all fields
ASSIGN COMPONENT 'NODETYPE' OF STRUCTURE <fs_zspro> TO <fw_zspro>.
IF <fw_zspro> = 1.
ASSIGN COMPONENT 'NODEPARAM' OF STRUCTURE <fs_zspro>
TO <fw_zspro>.
LOOP AT lt_ddic_fields INTO ls_ddic_fields
WHERE tabname = <fw_zspro>.
CLEAR ls_node.
lw_node_number = lw_node_number + 1.
CONCATENATE 'F' lw_node_number INTO ls_node-node_key.
ls_node-relatkey = lw_nodekey.
ls_node-relatship = cl_gui_column_tree=>relat_last_child.
IF ls_ddic_fields-keyflag = space.
ls_node-n_image = '@3W@'.
ls_node-exp_image = '@3W@'.
ELSE.
ls_node-n_image = '@3V@'.
ls_node-exp_image = '@3V@'.
ENDIF.
ls_node-dragdropid = w_dragdrop_handle_tree.
APPEND ls_node TO t_node_zspro.
CLEAR ls_item.
ls_item-node_key = ls_node-node_key.
ls_item-class = cl_gui_column_tree=>item_class_text.
ls_item-item_name = c_ddic_col1.
ls_item-text = ls_ddic_fields-fieldname.
APPEND ls_item TO t_item_zspro.
ls_item-item_name = c_ddic_col2.
IF NOT ls_ddic_fields-ddtext1 IS INITIAL.
ls_item-text = ls_ddic_fields-ddtext1.
ELSE.
ls_item-text = ls_ddic_fields-ddtext2.
ENDIF.
APPEND ls_item TO t_item_zspro.
ENDLOOP.
ENDIF.
ENDLOOP.
* Clean Empty nodes
DO.
lw_found = space.
LOOP AT t_node_zspro INTO ls_node WHERE isfolder = abap_true.
READ TABLE t_node_zspro WITH KEY relatkey = ls_node-node_key
TRANSPORTING NO FIELDS.
IF sy-subrc NE 0.
lw_found = abap_true.
DELETE t_node_zspro.
DELETE t_item_zspro WHERE node_key = ls_node-node_key.
ENDIF.
ENDLOOP.
IF lw_found = space.
EXIT.
ENDIF.
ENDDO.
ENDFORM. "ddic_add_tree_zspro
```
|
I found vulnerabilities in the line:
```abap
SELECT * FROM (lc_zspro)
```
Explanation: Potential dangerous statement Dynamic SQL.
| 2,796 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
TRY.
SELECT COUNT(*) UP TO 1 ROWS FROM (table).
CATCH cx_sy_dynamic_osql_syntax
cx_sy_dynamic_osql_semantics INTO lx.
MESSAGE lx TYPE 'S' DISPLAY LIKE 'E'.
RETURN.
ENDTRY.
```
|
I found vulnerabilities in the line:
```abap
SELECT COUNT(*) UP TO 1 ROWS FROM (table).
```
Explanation: Potential dangerous statement Dynamic SQL.
| 2,797 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
TRY.
SELECT * UP TO @rows ROWS
FROM (table)
INTO TABLE @<lt_data>
ORDER BY PRIMARY KEY.
CATCH cx_sy_dynamic_osql_syntax
cx_sy_dynamic_osql_semantics INTO lx.
MESSAGE lx TYPE 'S' DISPLAY LIKE 'E'.
RETURN.
ENDTRY.
```
|
I found vulnerabilities in the line:
```abap
SELECT * UP TO @rows ROWS
```
Explanation: Potential dangerous statement Dynamic SQL.
| 2,798 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS zcl_dbbr_sql_selection IMPLEMENTATION.
METHOD create.
rr_instance = NEW zcl_dbbr_sql_selection( ).
rr_instance->mt_select = it_select.
rr_instance->mt_from = it_from.
rr_instance->mt_having = it_having.
rr_instance->mt_where = it_where.
rr_instance->mt_order_by = it_order_by.
rr_instance->mt_group_by = it_group_by.
rr_instance->mv_max_size = iv_max_size.
ENDMETHOD.
METHOD determine_size_for_group_by.
DATA: lx_root TYPE REF TO cx_root.
FIELD-SYMBOLS: <lt_data> TYPE table.
*** IF sy-saprl > 751. " Common table expressions exist
*** rv_size = get_group_by_size_by_cte( ).
*** ELSE.
ASSIGN ir_t_data->* TO <lt_data>.
TRY.
SELECT (mt_select)
FROM (mt_from)
WHERE (mt_where)
GROUP BY (mt_group_by)
HAVING (mt_having)
ORDER BY (mt_order_by)
INTO CORRESPONDING FIELDS OF TABLE @<lt_data>.
rv_size = lines( <lt_data> ).
CLEAR <lt_data>.
CATCH cx_root INTO lx_root.
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_root.
ENDTRY.
*** ENDIF.
ENDMETHOD.
METHOD determine_size.
DATA: lx_root TYPE REF TO cx_root.
FIELD-SYMBOLS: <lt_for_all_data> TYPE table.
TRY.
SELECT COUNT( * )
FROM (mt_from)
WHERE (mt_where)
INTO @rv_size.
CATCH cx_root INTO lx_root.
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_root.
ENDTRY.
ENDMETHOD.
METHOD fill_having.
DATA: lv_having TYPE string.
LOOP AT mt_having ASSIGNING FIELD-SYMBOL(<lv_having>).
CLEAR: lv_having.
IF sy-tabix = 1.
lv_having = | HAVING { <lv_having> }|.
ELSE.
lv_having = | { <lv_having> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_having ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_from.
DATA: lv_from TYPE string.
LOOP AT mt_from ASSIGNING FIELD-SYMBOL(<lv_from>).
CLEAR: lv_from.
IF sy-tabix = 1.
lv_from = | FROM { <lv_from> }|.
ELSE.
lv_from = | { <lv_from> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_from ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_group_by.
DATA: lv_group_by TYPE string.
LOOP AT mt_group_by ASSIGNING FIELD-SYMBOL(<lv_group_by>).
CLEAR: lv_group_by.
IF sy-tabix = 1.
lv_group_by = | GROUP BY { <lv_group_by> }|.
ELSE.
lv_group_by = | { <lv_group_by> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_group_by ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_order_by.
DATA: lv_order_by TYPE string.
LOOP AT mt_order_by ASSIGNING FIELD-SYMBOL(<lv_order_by>).
CLEAR: lv_order_by.
IF sy-tabix = 1.
lv_order_by = | ORDER BY { <lv_order_by> }|.
ELSE.
lv_order_by = | { <lv_order_by> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_order_by ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_select.
DATA: lv_select TYPE string.
LOOP AT mt_select ASSIGNING FIELD-SYMBOL(<lv_select>).
CLEAR: lv_select.
IF sy-tabix = 1.
lv_select = |SELECT { <lv_select> }|.
ELSE.
lv_select = | { <lv_select> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_select ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_where.
DATA: lv_where TYPE string.
LOOP AT mt_where ASSIGNING FIELD-SYMBOL(<lv_where>).
CLEAR: lv_where.
IF sy-tabix = 1.
lv_where = |WHERE { <lv_where> }|.
ELSE.
lv_where = | { <lv_where> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_where ) ).
ENDLOOP.
ENDMETHOD.
METHOD select_data.
DATA: lx_root TYPE REF TO cx_root.
TRY.
SELECT (mt_select)
FROM (mt_from)
WHERE (mt_where)
GROUP BY (mt_group_by)
HAVING (mt_having)
ORDER BY (mt_order_by)
INTO CORRESPONDING FIELDS OF TABLE @et_data
UP TO @mv_max_size ROWS.
CATCH cx_root INTO lx_root.
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_root.
ENDTRY.
ENDMETHOD.
METHOD set_max_rows.
mv_max_size = iv_max_rows.
ENDMETHOD.
METHOD update_from.
mt_from = it_from.
ENDMETHOD.
METHOD get_select_sql.
DATA: lt_sql_lines TYPE string_table.
fill_select( CHANGING ct_lines = lt_sql_lines ).
fill_from( CHANGING ct_lines = lt_sql_lines ).
fill_where( CHANGING ct_lines = lt_sql_lines ).
fill_group_by( CHANGING ct_lines = lt_sql_lines ).
fill_having( CHANGING ct_lines = lt_sql_lines ).
fill_order_by( CHANGING ct_lines = lt_sql_lines ).
CONCATENATE LINES OF lt_sql_lines INTO rv_select_sql SEPARATED BY cl_abap_char_utilities=>cr_lf.
ENDMETHOD.
METHOD create_count_query_for_cte.
DATA: lt_sql_lines TYPE string_table,
lv_query TYPE string.
lt_sql_lines = VALUE #(
( |WITH| )
( | +group_select as (| )
( || ) ).
fill_select( CHANGING ct_lines = lt_sql_lines ).
fill_from( CHANGING ct_lines = lt_sql_lines ).
fill_where( CHANGING ct_lines = lt_sql_lines ).
fill_group_by( CHANGING ct_lines = lt_sql_lines ).
fill_having( CHANGING ct_lines = lt_sql_lines ).
lt_sql_lines = VALUE #( BASE lt_sql_lines
( |)| )
( |SELECT COUNT(*) FROM +group_select| ) ).
CONCATENATE LINES OF lt_sql_lines INTO lv_query SEPARATED BY cl_abap_char_utilities=>cr_lf.
TRY.
ro_query = NEW zcl_dbbr_sql_query_parser(
iv_query = lv_query
if_fill_log_for_messages = abap_false
)->parse( ).
CATCH zcx_dbbr_sql_query_error INTO DATA(lx_error).
lx_error->zif_sat_exception_message~print( ).
ENDTRY.
ENDMETHOD.
METHOD get_group_by_size_by_cte.
DATA(lo_count_query) = create_count_query_for_cte( ).
CHECK lo_count_query IS NOT INITIAL.
zcl_dbbr_sql_query_exec=>execute_query(
EXPORTING
io_query = lo_count_query
iv_row_count = mv_max_size
IMPORTING
et_data_info = DATA(lt_data_info)
ev_execution_time = DATA(lv_exec_time)
ev_message = DATA(lv_message)
ev_message_type = DATA(lv_message_type)
er_data = DATA(lr_t_result) ).
zcl_dbbr_sql_query_exec=>get_single_value_from_result(
EXPORTING
it_result_info = lt_data_info
ir_t_data = lr_t_result
IMPORTING
ev_value = rv_size ).
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
SELECT COUNT( * )
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
CLASS zcl_dbbr_sql_selection IMPLEMENTATION.
METHOD create.
ro_instance = NEW zcl_dbbr_sql_selection( ).
ro_instance->mt_select = it_select.
ro_instance->mt_from = it_from.
ro_instance->mt_having = it_having.
ro_instance->mt_where = it_where.
ro_instance->mt_order_by = it_order_by.
ro_instance->mt_group_by = it_group_by.
ro_instance->mv_max_size = iv_max_size.
SET HANDLER ro_instance->on_async_query_finished ACTIVATION 'X'.
ENDMETHOD.
METHOD unregister_evt_handlers.
SET HANDLER on_async_query_finished ACTIVATION space.
ENDMETHOD.
METHOD determine_size_for_group_by.
DATA: lx_root TYPE REF TO cx_root.
FIELD-SYMBOLS: <lt_data> TYPE table.
IF sy-saprl > 751.
rv_size = get_group_by_size_by_cte( ).
ELSE.
ASSIGN ir_t_data->* TO <lt_data>.
TRY.
SELECT (mt_select)
FROM (mt_from)
WHERE (mt_where)
GROUP BY (mt_group_by)
HAVING (mt_having)
ORDER BY (mt_order_by)
INTO CORRESPONDING FIELDS OF TABLE @<lt_data>.
rv_size = lines( <lt_data> ).
CLEAR <lt_data>.
CATCH cx_root INTO lx_root.
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_root.
ENDTRY.
ENDIF.
ENDMETHOD.
METHOD determine_size.
TRY.
SELECT COUNT( * )
FROM (mt_from)
WHERE (mt_where)
INTO @rv_size.
CATCH cx_root INTO DATA(lx_root).
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_root.
ENDTRY.
ENDMETHOD.
METHOD determine_size_async.
DATA: lt_sql_lines TYPE string_table.
lt_sql_lines = VALUE #( ( `SELECT COUNT(*)` ) ).
fill_from( CHANGING ct_lines = lt_sql_lines ).
fill_where( CHANGING ct_lines = lt_sql_lines ).
TRY.
zcl_dbbr_sql_query_exec=>execute_query_async(
io_query = NEW zcl_dbbr_sql_query_parser(
iv_query = concat_lines_of( table = lt_sql_lines sep = cl_abap_char_utilities=>cr_lf )
if_fill_log_for_messages = abap_false
)->parse( ) ).
CATCH zcx_dbbr_sql_query_error INTO DATA(lx_error).
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_error.
ENDTRY.
ENDMETHOD.
METHOD determine_group_by_size_async.
DATA: lt_sql_lines TYPE string_table,
lo_count_query TYPE REF TO zcl_dbbr_sql_query.
IF sy-saprl > 751.
lo_count_query = create_count_query_for_cte( ).
ELSE.
fill_select( CHANGING ct_lines = lt_sql_lines ).
fill_from( CHANGING ct_lines = lt_sql_lines ).
fill_where( CHANGING ct_lines = lt_sql_lines ).
fill_group_by( CHANGING ct_lines = lt_sql_lines ).
fill_having( CHANGING ct_lines = lt_sql_lines ).
TRY.
lo_count_query = NEW zcl_dbbr_sql_query_parser(
iv_query = concat_lines_of( table = lt_sql_lines sep = cl_abap_char_utilities=>cr_lf )
if_fill_log_for_messages = abap_false
)->parse( ).
CATCH zcx_dbbr_sql_query_error INTO DATA(lx_error).
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_error.
ENDTRY.
ENDIF.
IF lo_count_query IS NOT INITIAL.
zcl_dbbr_sql_query_exec=>execute_query_async(
io_query = lo_count_query
iv_row_count = 0 ).
ENDIF.
ENDMETHOD.
METHOD fill_having.
DATA: lv_having TYPE string.
LOOP AT mt_having ASSIGNING FIELD-SYMBOL(<lv_having>).
CLEAR: lv_having.
IF sy-tabix = 1.
lv_having = | HAVING { <lv_having> }|.
ELSE.
lv_having = | { <lv_having> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_having ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_from.
DATA: lv_from TYPE string.
LOOP AT mt_from ASSIGNING FIELD-SYMBOL(<lv_from>).
CLEAR: lv_from.
IF sy-tabix = 1.
lv_from = | FROM { <lv_from> }|.
ELSE.
lv_from = | { <lv_from> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_from ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_group_by.
DATA: lv_group_by TYPE string.
LOOP AT mt_group_by ASSIGNING FIELD-SYMBOL(<lv_group_by>).
CLEAR: lv_group_by.
IF sy-tabix = 1.
lv_group_by = | GROUP BY { <lv_group_by> }|.
ELSE.
lv_group_by = | { <lv_group_by> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_group_by ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_order_by.
DATA: lv_order_by TYPE string.
LOOP AT mt_order_by ASSIGNING FIELD-SYMBOL(<lv_order_by>).
CLEAR: lv_order_by.
IF sy-tabix = 1.
lv_order_by = | ORDER BY { <lv_order_by> }|.
ELSE.
lv_order_by = | { <lv_order_by> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_order_by ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_select.
DATA: lv_select TYPE string.
LOOP AT mt_select ASSIGNING FIELD-SYMBOL(<lv_select>).
CLEAR: lv_select.
IF sy-tabix = 1.
lv_select = |SELECT { <lv_select> }|.
ELSE.
lv_select = | { <lv_select> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_select ) ).
ENDLOOP.
ENDMETHOD.
METHOD fill_where.
DATA: lv_where TYPE string.
LOOP AT mt_where ASSIGNING FIELD-SYMBOL(<lv_where>).
CLEAR: lv_where.
IF sy-tabix = 1.
lv_where = |WHERE { <lv_where> }|.
ELSE.
lv_where = | { <lv_where> }|.
ENDIF.
ct_lines = VALUE #( BASE ct_lines ( lv_where ) ).
ENDLOOP.
ENDMETHOD.
METHOD select_data.
DATA: lx_root TYPE REF TO cx_root.
TRY.
SELECT (mt_select)
FROM (mt_from)
WHERE (mt_where)
GROUP BY (mt_group_by)
HAVING (mt_having)
ORDER BY (mt_order_by)
INTO CORRESPONDING FIELDS OF TABLE @et_data
UP TO @mv_max_size ROWS.
CATCH cx_root INTO lx_root.
RAISE EXCEPTION TYPE zcx_dbbr_selection_common
EXPORTING
previous = lx_root.
ENDTRY.
ENDMETHOD.
METHOD set_max_rows.
mv_max_size = iv_max_rows.
ENDMETHOD.
METHOD update_from.
mt_from = it_from.
ENDMETHOD.
METHOD get_select_sql.
DATA: lt_sql_lines TYPE string_table.
fill_select( CHANGING ct_lines = lt_sql_lines ).
fill_from( CHANGING ct_lines = lt_sql_lines ).
fill_where( CHANGING ct_lines = lt_sql_lines ).
fill_group_by( CHANGING ct_lines = lt_sql_lines ).
fill_having( CHANGING ct_lines = lt_sql_lines ).
fill_order_by( CHANGING ct_lines = lt_sql_lines ).
CONCATENATE LINES OF lt_sql_lines INTO rv_select_sql SEPARATED BY cl_abap_char_utilities=>cr_lf.
ENDMETHOD.
METHOD create_count_query_for_cte.
DATA: lt_sql_lines TYPE string_table,
lv_query TYPE string.
lt_sql_lines = VALUE #(
( |WITH| )
( | +group_select as (| ) ).
fill_select( CHANGING ct_lines = lt_sql_lines ).
fill_from( CHANGING ct_lines = lt_sql_lines ).
fill_where( CHANGING ct_lines = lt_sql_lines ).
fill_group_by( CHANGING ct_lines = lt_sql_lines ).
fill_having( CHANGING ct_lines = lt_sql_lines ).
lt_sql_lines = VALUE #( BASE lt_sql_lines
( |)| )
( |SELECT COUNT(*) FROM +group_select| ) ).
CONCATENATE LINES OF lt_sql_lines INTO lv_query SEPARATED BY cl_abap_char_utilities=>cr_lf.
TRY.
ro_query = NEW zcl_dbbr_sql_query_parser(
iv_query = lv_query
if_fill_log_for_messages = abap_false
)->parse( ).
CATCH zcx_dbbr_sql_query_error INTO DATA(lx_error).
lx_error->zif_sat_exception_message~print( ).
ENDTRY.
ENDMETHOD.
METHOD get_group_by_size_by_cte.
DATA(lo_count_query) = create_count_query_for_cte( ).
CHECK lo_count_query IS NOT INITIAL.
zcl_dbbr_sql_query_exec=>execute_query(
EXPORTING
io_query = lo_count_query
iv_row_count = mv_max_size
IMPORTING
et_data_info = DATA(lt_data_info)
ev_execution_time = DATA(lv_exec_time)
ev_message = DATA(lv_message)
ev_message_type = DATA(lv_message_type)
er_data = DATA(lr_t_result) ).
zcl_dbbr_sql_query_exec=>get_single_value_from_result(
EXPORTING
it_result_info = lt_data_info
ir_t_data = lr_t_result
IMPORTING
ev_value = rv_size ).
ENDMETHOD.
METHOD on_async_query_finished.
DATA: lv_count TYPE zdbbr_no_of_lines.
FIELD-SYMBOLS: <lt_data> TYPE table.
ASSIGN er_data->* TO <lt_data>.
IF sy-subrc = 0 AND lines( <lt_data> ) > 1.
lv_count = lines( <lt_data> ).
ELSE.
zcl_dbbr_sql_query_exec=>get_single_value_from_result(
EXPORTING it_result_info = et_data_info
ir_t_data = er_data
IMPORTING ev_value = lv_count ).
ENDIF.
RAISE EVENT count_query_finished
EXPORTING
ev_count = lv_count.
ENDMETHOD.
ENDCLASS.
```
| 2,801 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS zcl_art_shade_rec IMPLEMENTATION.
METHOD constructor.
IF i_world IS SUPPLIED.
ASSERT i_world IS BOUND.
hit_an_object = abap_false.
CREATE OBJECT local_hit_point.
CREATE OBJECT normal.
CREATE OBJECT color
EXPORTING
i_color = zcl_art_rgb_color=>black.
world = i_world.
RETURN.
ENDIF.
IF i_shade_rec IS SUPPLIED.
ASSERT i_shade_rec IS BOUND.
SYSTEM-CALL OBJMGR CLONE i_shade_rec TO me.
ENDIF.
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
SYSTEM-CALL OBJMGR CLONE i_shade_rec TO me.
```
Explanation: Potential dangerous statement SYSTEM-CALL.
Suggested fix:
```abap
CLASS ZCL_ART_SHADE_REC IMPLEMENTATION.
METHOD new_copy.
ASSERT i_shade_rec IS BOUND.
r_instance = NEW #( ).
r_instance->hit_an_object = i_shade_rec->hit_an_object.
r_instance->local_hit_point = zcl_art_point3d=>new_copy( i_shade_rec->local_hit_point ).
r_instance->color = zcl_art_rgb_color=>new_copy( i_shade_rec->color ).
r_instance->world = i_shade_rec->world.
ENDMETHOD.
METHOD new_from_world.
ASSERT i_world IS BOUND.
r_instance = NEW #( ).
r_instance->world = i_world.
r_instance->hit_an_object = abap_false.
r_instance->normal = NEW #( ).
r_instance->local_hit_point = zcl_art_point3d=>new_default( ).
r_instance->color = zcl_art_rgb_color=>new_copy( zcl_art_rgb_color=>black ).
ENDMETHOD.
ENDCLASS.
```
| 2,802 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD determine_tagged_object_count.
DATA: where TYPE TABLE OF string.
LOOP AT object_refs ASSIGNING FIELD-SYMBOL(<obj_ref>).
DATA(operator) = COND #( WHEN sy-tabix <> 1 THEN ` OR ` ELSE `` ).
where = VALUE #( BASE where
( |{ operator }( OBJECT_TYPE = { cl_abap_dyn_prg=>quote( <obj_ref>-tadir_type ) } | &&
|AND OBJECT_NAME = { cl_abap_dyn_prg=>quote( <obj_ref>-name ) } )| ) ).
ENDLOOP.
SELECT tag_id, COUNT( * ) AS count
FROM zabaptags_tgobj
WHERE (where)
GROUP BY tag_id
INTO CORRESPONDING FIELDS OF TABLE @tagged_obj_counts.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
SELECT tag_id, COUNT( * ) AS count
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
METHOD determine_tagged_object_count.
tagged_obj_counts = tags_dac->get_tagged_obj_count( object_refs = CORRESPONDING #( object_refs ) ).
ENDMETHOD.
```
| 2,803 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
WHILE child_tags IS NOT INITIAL.
SELECT (fields)
FROM zabaptags_tags
FOR ALL ENTRIES IN @child_tags
WHERE parent_tag_id = @child_tags-tag_id
INTO CORRESPONDING FIELDS OF TABLE @new_child_tags.
tags = CORRESPONDING #( BASE ( tags ) new_child_tags ).
child_tags = CORRESPONDING #( new_child_tags ).
ENDWHILE.
```
|
I found vulnerabilities in the line:
```abap
SELECT (fields)
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
WHILE child_tags IS NOT INITIAL.
new_child_tags = zcl_abaptags_tags_dac=>get_instance( )->find_tags(
columns = columns
parent_tag_id_range = VALUE #( FOR child IN child_tags
( sign = 'I' option = 'EQ' low = child-tag_id ) ) ).
tags = CORRESPONDING #( BASE ( tags ) new_child_tags ).
child_tags = CORRESPONDING #( new_child_tags ).
ENDWHILE.
```
| 2,804 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD deserialize_program.
DATA: lv_exists TYPE abap_bool,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_INSERT'
EXPORTING
object = is_progdir-name
object_class = 'ABAP'
devclass = iv_package
master_language = mv_language
mode = 'I'
suppress_dialog = abap_true
EXCEPTIONS
cancelled = 1
permission_failure = 2
unknown_objectclass = 3
OTHERS = 4.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise_t100( ).
ENDIF.
READ TABLE it_tpool INTO ls_tpool WITH KEY id = 'R'.
IF sy-subrc = 0.
* there is a bug in RPY_PROGRAM_UPDATE, the header line of TTAB is not
* cleared, so the title length might be inherited from a different program.
ASSIGN ('(SAPLSIFP)TTAB') TO <lg_any>.
IF sy-subrc = 0.
CLEAR <lg_any>.
ENDIF.
lv_title = ls_tpool-entry.
ENDIF.
SELECT SINGLE progname FROM reposrc INTO lv_progname
WHERE progname = is_progdir-name
AND r3state = 'A'.
lv_exists = boolc( sy-subrc = 0 ).
IF lv_exists = abap_true.
zcl_abapgit_language=>set_current_language( mv_language ).
CALL FUNCTION 'RPY_PROGRAM_UPDATE'
EXPORTING
program_name = is_progdir-name
title_string = lv_title
save_inactive = 'I'
TABLES
source_extended = it_source
EXCEPTIONS
cancelled = 1
permission_error = 2
not_found = 3
OTHERS = 4.
IF sy-subrc <> 0.
zcl_abapgit_language=>restore_login_language( ).
IF sy-msgid = 'EU' AND sy-msgno = '510'.
zcx_abapgit_exception=>raise( 'User is currently editing program' ).
ELSEIF sy-msgid = 'EU' AND sy-msgno = '522'.
* for generated table maintenance function groups, the author is set to SAP* instead of the user which
* generates the function group. This hits some standard checks, pulling new code again sets the author
* to the current user which avoids the check
zcx_abapgit_exception=>raise( |Delete function group and pull again, { is_progdir-name } (EU522)| ).
ELSE.
zcx_abapgit_exception=>raise( |PROG { is_progdir-name }, updating error: { sy-msgid } { sy-msgno }| ).
ENDIF.
ENDIF.
zcl_abapgit_language=>restore_login_language( ).
ELSEIF strlen( is_progdir-name ) > 30.
* function module RPY_PROGRAM_INSERT cannot handle function group includes
" special treatment for extensions
" if the program name exceeds 30 characters it is not a usual
" ABAP program but might be some extension, which requires the internal
" addition EXTENSION TYPE, see
" http://help.sap.com/abapdocu_751/en/abapinsert_report_internal.htm#!ABAP_ADDITION_1@1@
" This e.g. occurs in case of transportable Code Inspector variants (ending with ===VC)
INSERT REPORT is_progdir-name
FROM it_source
STATE 'I'
EXTENSION TYPE is_progdir-name+30.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'error from INSERT REPORT .. EXTENSION TYPE' ).
ENDIF.
ELSE.
INSERT REPORT is_progdir-name
FROM it_source
STATE 'I'
PROGRAM TYPE is_progdir-subc.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'error from INSERT REPORT' ).
ENDIF.
ENDIF.
IF NOT it_tpool[] IS INITIAL.
INSERT TEXTPOOL is_progdir-name
FROM it_tpool
LANGUAGE mv_language
STATE 'I'.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'error from INSERT TEXTPOOL' ).
ENDIF.
ENDIF.
CALL FUNCTION 'READ_PROGDIR'
EXPORTING
i_progname = is_progdir-name
i_state = 'I'
IMPORTING
e_progdir = ls_progdir_new
EXCEPTIONS
not_exists = 1
OTHERS = 2.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( |not found in PROGDIR. Subrc = { sy-subrc }| ).
ENDIF.
* todo, package?
ls_progdir_new-ldbname = is_progdir-ldbname.
ls_progdir_new-dbna = is_progdir-dbna.
ls_progdir_new-dbapl = is_progdir-dbapl.
ls_progdir_new-rload = is_progdir-rload.
ls_progdir_new-fixpt = is_progdir-fixpt.
ls_progdir_new-varcl = is_progdir-varcl.
ls_progdir_new-appl = is_progdir-appl.
ls_progdir_new-rstat = is_progdir-rstat.
ls_progdir_new-sqlx = is_progdir-sqlx.
ls_progdir_new-uccheck = is_progdir-uccheck.
ls_progdir_new-clas = is_progdir-clas.
CALL FUNCTION 'UPDATE_PROGDIR'
EXPORTING
i_progdir = ls_progdir_new
i_progname = ls_progdir_new-name
i_state = ls_progdir_new-state
EXCEPTIONS
not_executed = 1
OTHERS = 2.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( |PROG, error inserting. Subrc = { sy-subrc }| ).
ENDIF.
SELECT SINGLE * FROM progdir INTO ls_progdir_new
WHERE name = ls_progdir_new-name
AND state = ls_progdir_new-state.
IF sy-subrc = 0 AND is_progdir-varcl = space AND ls_progdir_new-varcl = abap_true.
* function module UPDATE_PROGDIR does not update VARCL
UPDATE progdir SET varcl = is_progdir-varcl
WHERE name = ls_progdir_new-name
AND state = ls_progdir_new-state. "#EC CI_SUBRC
ENDIF.
zcl_abapgit_objects_activation=>add(
iv_type = 'REPS'
iv_name = is_progdir-name ).
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
ELSE.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
METHOD deserialize_program.
DATA: lv_exists TYPE abap_bool,
lt_empty_src LIKE it_source,
lv_progname TYPE reposrc-progname,
ls_tpool LIKE LINE OF it_tpool,
lv_title TYPE rglif-title,
ls_progdir_new TYPE progdir.
FIELD-SYMBOLS: <lg_any> TYPE any.
CALL FUNCTION 'RS_CORR_INSERT'
EXPORTING
object = is_progdir-name
object_class = 'ABAP'
devclass = iv_package
master_language = mv_language
mode = 'I'
suppress_dialog = abap_true
EXCEPTIONS
cancelled = 1
permission_failure = 2
unknown_objectclass = 3
OTHERS = 4.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise_t100( ).
ENDIF.
READ TABLE it_tpool INTO ls_tpool WITH KEY id = 'R'.
IF sy-subrc = 0.
ASSIGN ('(SAPLSIFP)TTAB') TO <lg_any>.
IF sy-subrc = 0.
CLEAR <lg_any>.
ENDIF.
lv_title = ls_tpool-entry.
ENDIF.
SELECT SINGLE progname FROM reposrc INTO lv_progname
WHERE progname = is_progdir-name
AND r3state = 'A'.
lv_exists = boolc( sy-subrc = 0 ).
IF lv_exists = abap_true.
zcl_abapgit_language=>set_current_language( mv_language ).
CALL FUNCTION 'RPY_PROGRAM_UPDATE'
EXPORTING
program_name = is_progdir-name
title_string = lv_title
save_inactive = 'I'
TABLES
source_extended = it_source
EXCEPTIONS
cancelled = 1
permission_error = 2
not_found = 3
OTHERS = 4.
IF sy-subrc <> 0.
zcl_abapgit_language=>restore_login_language( ).
IF sy-msgid = 'EU' AND sy-msgno = '510'.
zcx_abapgit_exception=>raise( 'User is currently editing program' ).
ELSEIF sy-msgid = 'EU' AND sy-msgno = '522'.
zcx_abapgit_exception=>raise( |Delete function group and pull again, { is_progdir-name } (EU522)| ).
ELSE.
zcx_abapgit_exception=>raise_t100( ).
ENDIF.
ENDIF.
zcl_abapgit_language=>restore_login_language( ).
ELSEIF strlen( is_progdir-name ) > 30.
INSERT REPORT is_progdir-name
FROM it_source
STATE 'I'
EXTENSION TYPE is_progdir-name+30.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'error from INSERT REPORT .. EXTENSION TYPE' ).
ENDIF.
ELSE.
CALL FUNCTION 'RPY_PROGRAM_INSERT'
EXPORTING
development_class = iv_package
program_name = is_progdir-name
program_type = is_progdir-subc
title_string = lv_title
save_inactive = 'I'
suppress_dialog = abap_true
TABLES
source_extended = it_source
EXCEPTIONS
already_exists = 1
cancelled = 2
name_not_allowed = 3
permission_error = 4
OTHERS = 5.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise_t100( ).
ENDIF.
ENDIF.
IF NOT it_tpool[] IS INITIAL.
INSERT TEXTPOOL is_progdir-name
FROM it_tpool
LANGUAGE mv_language
STATE 'I'.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'error from INSERT TEXTPOOL' ).
ENDIF.
ENDIF.
CALL FUNCTION 'READ_PROGDIR'
EXPORTING
i_progname = is_progdir-name
i_state = 'I'
IMPORTING
e_progdir = ls_progdir_new
EXCEPTIONS
not_exists = 1
OTHERS = 2.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( |not found in PROGDIR. Subrc = { sy-subrc }| ).
ENDIF.
ls_progdir_new-ldbname = is_progdir-ldbname.
ls_progdir_new-dbna = is_progdir-dbna.
ls_progdir_new-dbapl = is_progdir-dbapl.
ls_progdir_new-rload = is_progdir-rload.
ls_progdir_new-fixpt = is_progdir-fixpt.
ls_progdir_new-varcl = is_progdir-varcl.
ls_progdir_new-appl = is_progdir-appl.
ls_progdir_new-rstat = is_progdir-rstat.
ls_progdir_new-sqlx = is_progdir-sqlx.
ls_progdir_new-uccheck = is_progdir-uccheck.
ls_progdir_new-clas = is_progdir-clas.
CALL FUNCTION 'UPDATE_PROGDIR'
EXPORTING
i_progdir = ls_progdir_new
i_progname = ls_progdir_new-name
i_state = ls_progdir_new-state
EXCEPTIONS
not_executed = 1
OTHERS = 2.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( |PROG, error inserting. Subrc = { sy-subrc }| ).
ENDIF.
SELECT SINGLE * FROM progdir INTO ls_progdir_new
WHERE name = ls_progdir_new-name
AND state = ls_progdir_new-state.
IF sy-subrc = 0 AND is_progdir-varcl = space AND ls_progdir_new-varcl = abap_true.
UPDATE progdir SET varcl = is_progdir-varcl
WHERE name = ls_progdir_new-name
AND state = ls_progdir_new-state.
ENDIF.
zcl_abapgit_objects_activation=>add(
iv_type = 'REPS'
iv_name = is_progdir-name ).
ENDMETHOD.
```
| 2,805 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
method ADD_TABLE_TO_BUNDLE.
FIELD-SYMBOLS: <con> TYPE STANDARD TABLE.
IF _table-fake_table IS INITIAL.
_table-fake_table = _table-source_table.
ENDIF.
IF line_exists( cluster_objects[ name = _table-fake_table ] ).
RAISE EXCEPTION TYPE zcx_export_table_duplicate
EXPORTING
table = _table-fake_table.
ENDIF.
INSERT _table INTO TABLE table_list.
APPEND INITIAL LINE TO cluster_objects
ASSIGNING FIELD-SYMBOL(<content>).
<content>-name = _table-fake_table.
CREATE DATA <content>-value TYPE STANDARD TABLE OF
(_table-source_table).
ASSIGN <content>-value->* TO <con>.
TRY.
SELECT * FROM (_table-source_table) INTO TABLE @<con>
WHERE (_table-where_restriction).
CATCH cx_sy_dynamic_osql_error INTO DATA(osql_syntax_error).
RAISE EXCEPTION TYPE zcx_export_where_clause_invali
EXPORTING
table = _table-source_table
where_clause = _table-where_restriction
failure_description = osql_syntax_error->msgtext.
ENDTRY.
instance = me.
endmethod.
```
|
I found vulnerabilities in the line:
```abap
SELECT * FROM (_table-source_table) INTO TABLE @<con>
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
METHOD add_table_to_bundle.
FIELD-SYMBOLS: <con> TYPE STANDARD TABLE.
IF _table-fake_table IS INITIAL.
_table-fake_table = _table-source_table.
ENDIF.
IF line_exists( cluster_objects[ name = _table-fake_table ] ).
RAISE EXCEPTION TYPE zcx_export_table_duplicate
EXPORTING
table = _table-fake_table.
ENDIF.
INSERT _table INTO TABLE table_list.
APPEND INITIAL LINE TO cluster_objects
ASSIGNING FIELD-SYMBOL(<content>).
<content>-name = _table-fake_table.
CREATE DATA <content>-value TYPE STANDARD TABLE OF
(_table-source_table).
ASSIGN <content>-value->* TO <con>.
select( EXPORTING table_conjunction = _table
IMPORTING content = <con> ).
instance = me.
ENDMETHOD.
```
| 2,806 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
TRY.
_table-tdc_parameter_name = create_parameter( _table-fake_table ).
CREATE DATA content TYPE STANDARD TABLE OF (_table-source_table).
ASSIGN content->* TO <con>.
SELECT * FROM (_table-source_table) INTO TABLE @<con>
WHERE (_table-where_restriction).
_table-is_initial = xsdbool( <con> IS INITIAL ).
set_parameter_value( content = <con> name = _table-tdc_parameter_name ).
INSERT _table INTO TABLE table_list.
CATCH cx_sy_dynamic_osql_error INTO DATA(osql_syntax_error).
RAISE EXCEPTION TYPE zcx_export_where_clause_invali
EXPORTING
table = _table-source_table
where_clause = _table-where_restriction
failure_description = osql_syntax_error->msgtext.
CATCH cx_ecatt_tdc_access INTO DATA(ecatt_failure).
zcx_export_error=>wrap_ecatt_failure( ecatt_failure ).
ENDTRY.
```
|
I found vulnerabilities in the line:
```abap
SELECT * FROM (_table-source_table) INTO TABLE @<con>
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
TRY.
_table-tdc_parameter_name = create_parameter( _table-fake_table ).
CREATE DATA content TYPE STANDARD TABLE OF (_table-fake_table).
ASSIGN content->* TO <con>.
select( EXPORTING table_conjunction = _table
IMPORTING content = <con> ).
_table-is_initial = xsdbool( <con> IS INITIAL ).
set_parameter_value( content = <con> name = _table-tdc_parameter_name ).
INSERT _table INTO TABLE table_list.
CATCH cx_ecatt_tdc_access INTO DATA(ecatt_failure).
zcx_export_error=>wrap_ecatt_failure( ecatt_failure ).
ENDTRY.
```
| 2,807 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
LOOP AT cluster_objects REFERENCE INTO DATA(object).
ASSIGN object->*-value->* TO <con>.
READ TABLE table_list REFERENCE INTO DATA(_table)
WITH KEY fake_table = CONV tabname( object->*-name ).
ASSERT FIELDS object->*-name CONDITION sy-subrc = 0.
DELETE FROM (object->*-name) WHERE (_table->*-where_restriction).
INSERT (object->*-name) FROM TABLE <con>.
ENDLOOP.
```
|
I found vulnerabilities in the line:
```abap
DELETE FROM (object->*-name) WHERE (_table->*-where_restriction).
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
LOOP AT cluster_objects REFERENCE INTO DATA(object).
ASSIGN object->*-value->* TO <con>.
READ TABLE table_list REFERENCE INTO DATA(_table)
WITH KEY fake_table = CONV tabname( object->*-name ).
ASSERT FIELDS object->*-name CONDITION sy-subrc = 0.
delete( _table->* ).
INSERT (object->*-name) FROM TABLE <con>.
ENDLOOP.
```
| 2,808 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
LOOP AT table_list REFERENCE INTO DATA(table).
CREATE DATA content TYPE STANDARD TABLE OF (table->*-fake_table).
ASSIGN content->* TO <con>.
tdc->get_value( EXPORTING i_param_name = get_tdc_parameter_name( table->* )
i_variant_name = variant
CHANGING e_param_value = <con> ).
DELETE FROM (table->*-fake_table) WHERE (table->*-where_restriction).
" If no content is exported in other than the "ECATTDEFAULT"-variant,
" <con> contains the parameter value of the "ECATTDEFAULT"-variant.
" Therefore INSERT-Statement is only executed, when the exported content is not initial.
IF table->*-is_initial = abap_false.
MODIFY (table->*-fake_table) FROM TABLE <con>.
ENDIF.
ENDLOOP.
```
|
I found vulnerabilities in the line:
```abap
DELETE FROM (table->*-fake_table) WHERE (table->*-where_restriction).
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
LOOP AT table_list REFERENCE INTO DATA(table).
CREATE DATA content TYPE STANDARD TABLE OF (table->*-fake_table).
ASSIGN content->* TO <con>.
tdc->get_value( EXPORTING i_param_name = get_tdc_parameter_name( table->* )
i_variant_name = variant
CHANGING e_param_value = <con> ).
delete( table->* ).
IF table->*-is_initial = abap_false.
MODIFY (table->*-fake_table) FROM TABLE <con>.
ENDIF.
ENDLOOP.
```
| 2,809 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS Y_CHECK_DB_ACCESS_IN_UT IMPLEMENTATION.
METHOD constructor.
super->constructor( ).
settings-pseudo_comment = '"#EC DB_ACCESS_UT' ##NO_TEXT.
settings-disable_threshold_selection = abap_true.
settings-disable_on_prodcode_selection = abap_true.
settings-disable_on_testcode_selection = abap_true.
settings-threshold = 0.
settings-apply_on_productive_code = abap_false.
settings-apply_on_test_code = abap_true.
settings-documentation = |{ c_docs_path-checks }db-access-in-ut.md|.
set_check_message( 'Database access(es) within a Unit-Test should be removed!' ).
ENDMETHOD. "CONSTRUCTOR
METHOD execute_check.
CHECK has_osql_or_cds_framework( ) = abap_false.
LOOP AT ref_scan_manager->get_structures( ) ASSIGNING FIELD-SYMBOL(<structure>)
WHERE stmnt_type EQ scan_struc_stmnt_type-method.
is_testcode = test_code_detector->is_testcode( <structure> ).
IF is_testcode EQ abap_false.
CONTINUE.
ENDIF.
DATA(index) = <structure>-stmnt_from.
LOOP AT ref_scan_manager->get_statements( ) ASSIGNING FIELD-SYMBOL(<statement>)
FROM <structure>-stmnt_from TO <structure>-stmnt_to.
inspect_tokens( index = index
statement = <statement> ).
index = index + 1.
ENDLOOP.
ENDLOOP.
ENDMETHOD.
METHOD inspect_tokens.
DATA(token1) = get_token_abs( statement-from ).
DATA(token2) = get_token_abs( statement-from + 1 ).
DATA(token3) = get_token_abs( statement-from + 2 ).
DATA(has_db_keyword) = xsdbool( token1 = 'COMMIT'
OR token1 = 'ROLLBACK'
OR token1 = 'SELECT'
OR token1 = 'EXEC'
OR token1 = 'ALTER' ).
DATA(is_name_in_token3) = xsdbool( ( token1 = 'INSERT' AND token2 = 'INTO' )
OR ( token1 = 'DELETE' AND token2 = 'FROM' ) ).
DATA(is_name_in_token2) = xsdbool( ( token1 = 'INSERT'
OR token1 = 'UPDATE'
OR token1 = 'MODIFY'
OR token1 = 'DELETE' ) AND token3 = 'FROM' ).
IF has_db_keyword = abap_true
OR ( is_name_in_token3 = abap_true AND is_persistent_object( to_upper( token3 ) ) = abap_true )
OR ( is_name_in_token2 = abap_true AND is_persistent_object( to_upper( token2 ) ) = abap_true ).
check_if_error( index = index
statement = statement ).
ENDIF.
ENDMETHOD.
METHOD is_persistent_object.
TRY.
SELECT SINGLE devclass FROM tadir INTO @DATA(package)
WHERE pgmid = 'R3TR' AND
object = 'TABL' AND
obj_name = @obj_name.
IF sy-subrc NE 0.
result = abap_false.
RETURN.
ENDIF.
DATA(checked_object) = cl_abap_dyn_prg=>check_table_name_str(
val = obj_name
packages = package ).
DATA dynamic_line TYPE REF TO data.
FIELD-SYMBOLS <table_structure> TYPE any.
CREATE DATA dynamic_line TYPE (checked_object).
ASSIGN dynamic_line->* TO <table_structure>.
SELECT SINGLE * FROM (checked_object) INTO <table_structure>.
result = abap_true.
CATCH cx_root. "#EC NEED_CX_ROOT
result = abap_false.
ENDTRY.
ENDMETHOD.
METHOD check_if_error.
DATA check_configuration TYPE y_if_clean_code_manager=>check_configuration.
DATA(key_word) = get_token_abs( statement-from ).
check_configuration = detect_check_configuration( statement ).
IF check_configuration IS INITIAL.
RETURN.
ENDIF.
raise_error( statement_level = statement-level
statement_index = index
statement_from = statement-from
error_priority = check_configuration-prio
parameter_01 = |{ key_word }| ).
ENDMETHOD.
METHOD has_osql_or_cds_framework.
DATA(tokens) = ref_scan_manager->get_tokens( ).
IF line_exists( tokens[ str = 'IF_OSQL_TEST_ENVIRONMENT' ] )
OR line_exists( tokens[ str = 'IF_CDS_TEST_ENVIRONMENT' ] ).
result = abap_true.
ENDIF.
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
SELECT SINGLE * FROM (checked_object) INTO <table_structure>.
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
CLASS y_check_db_access_in_ut IMPLEMENTATION.
METHOD constructor.
super->constructor( ).
settings-pseudo_comment = '
settings-disable_threshold_selection = abap_true.
settings-disable_on_prodcode_selection = abap_true.
settings-disable_on_testcode_selection = abap_true.
settings-threshold = 0.
settings-apply_on_productive_code = abap_false.
settings-apply_on_test_code = abap_true.
settings-documentation = |{ c_docs_path-checks }db-access-in-ut.md|.
set_check_message( 'Database access(es) within a Unit-Test should be removed!' ).
ENDMETHOD.
METHOD execute_check.
LOOP AT ref_scan_manager->get_structures( ) ASSIGNING FIELD-SYMBOL(<structure>)
WHERE stmnt_type EQ scan_struc_stmnt_type-method.
is_testcode = test_code_detector->is_testcode( <structure> ).
IF is_testcode = abap_false.
CONTINUE.
ENDIF.
IF has_osql_or_cds_framework( <structure> ) = abap_true.
CONTINUE.
ENDIF.
determine_tokens_not_allowed( <structure> ).
DATA(index) = <structure>-stmnt_from.
LOOP AT ref_scan_manager->get_statements( ) ASSIGNING FIELD-SYMBOL(<statement>)
FROM <structure>-stmnt_from TO <structure>-stmnt_to.
inspect_tokens( index = index
statement = <statement> ).
index = index + 1.
ENDLOOP.
ENDLOOP.
ENDMETHOD.
METHOD inspect_tokens.
DATA(tokens) = consolidade_tokens( statement ).
LOOP AT tokens_not_allowed ASSIGNING FIELD-SYMBOL(<token_not_allowed>).
IF tokens NP <token_not_allowed>.
CONTINUE.
ENDIF.
IF has_ddic_itab_same_syntax( <token_not_allowed> ) = abap_true
AND is_internal_table( statement ) = abap_true.
CONTINUE.
ENDIF.
DATA(check_configuration) = detect_check_configuration( statement ).
IF check_configuration IS INITIAL.
RETURN.
ENDIF.
raise_error( statement_level = statement-level
statement_index = index
statement_from = statement-from
error_priority = check_configuration-prio ).
ENDLOOP.
ENDMETHOD.
METHOD is_persistent_object.
cl_abap_structdescr=>describe_by_name( EXPORTING p_name = obj_name
EXCEPTIONS OTHERS = 1 ).
result = xsdbool( sy-subrc = 0 ).
ENDMETHOD.
METHOD has_osql_or_cds_framework.
TRY.
DATA(class_definition) = get_class_definition( method ).
CATCH cx_sy_itab_line_not_found.
RETURN.
ENDTRY.
LOOP AT ref_scan_manager->get_statements( ) ASSIGNING FIELD-SYMBOL(<statement>)
FROM class_definition-stmnt_from TO class_definition-stmnt_to.
LOOP AT ref_scan_manager->get_tokens( ) ASSIGNING FIELD-SYMBOL(<token>)
FROM <statement>-from TO <statement>-to
WHERE str = 'IF_OSQL_TEST_ENVIRONMENT'
OR str = 'CL_OSQL_TEST_ENVIRONMENT'
OR str = 'IF_CDS_TEST_ENVIRONMENT'
OR str = 'CL_CDS_TEST_ENVIRONMENT'.
result = abap_true.
RETURN.
ENDLOOP.
ENDLOOP.
ENDMETHOD.
METHOD consolidade_tokens.
LOOP AT ref_scan_manager->get_tokens( ) INTO DATA(token)
FROM statement-from TO statement-to.
token-str = condense( token-str ).
result = COND #( WHEN result IS INITIAL THEN token-str
ELSE |{ result } { token-str }| ).
ENDLOOP.
ENDMETHOD.
METHOD get_class_definition.
DATA(structures) = ref_scan_manager->get_structures( ).
DATA(class_implementation) = structures[ method-back ].
result = structures[ class_implementation-back ].
ENDMETHOD.
METHOD get_test_risk_level.
TRY.
DATA(class_definition) = get_class_definition( method ).
CATCH cx_sy_itab_line_not_found.
RETURN.
ENDTRY.
LOOP AT ref_scan_manager->get_statements( ) ASSIGNING FIELD-SYMBOL(<statement>)
FROM class_definition-stmnt_from TO class_definition-stmnt_to.
DATA(tokens) = consolidade_tokens( <statement> ).
result = COND #( WHEN tokens CS 'RISK LEVEL HARMLESS' THEN risk_level_harmless
WHEN tokens CS 'RISK LEVEL DANGEROUS' THEN risk_level_dangerous
WHEN tokens CS 'RISK LEVEL CRITICAL' THEN risk_level_critical ).
IF result IS NOT INITIAL.
RETURN.
ENDIF.
ENDLOOP.
result = risk_level_not_set.
ENDMETHOD.
METHOD determine_tokens_not_allowed.
DATA(test_risk_level) = get_test_risk_level( method ).
tokens_not_allowed = COND #( WHEN test_risk_level = risk_level_harmless THEN VALUE #( ( 'ALTER *' ) ( 'DELETE *' ) ( 'UPDATE *' ) ( 'MODIFY *' ) ( 'INSERT INTO *' ) ( 'SELECT *' ) ( 'COMMIT*' ) ( 'ROLLBACK*' ) )
WHEN test_risk_level = risk_level_not_set THEN VALUE #( ( 'ALTER *' ) ( 'DELETE *' ) ( 'UPDATE *' ) ( 'MODIFY *' ) ( 'INSERT INTO *' ) ( 'SELECT *' ) ( 'COMMIT*' ) ( 'ROLLBACK*' ) )
WHEN test_risk_level = risk_level_dangerous THEN VALUE #( ( 'ALTER *' ) ( 'DELETE *' ) ( 'UPDATE *' ) ( 'MODIFY *' ) )
WHEN test_risk_level = risk_level_critical THEN VALUE #( ( 'ALTER *' ) ( 'DELETE *' ) ( 'UPDATE *' ) ( 'MODIFY *' ) ) ).
ENDMETHOD.
METHOD has_ddic_itab_same_syntax.
result = xsdbool( token CS 'MODIFY'
OR token CS 'UPDATE'
OR token CS 'DELETE' ).
ENDMETHOD.
METHOD is_internal_table.
result = xsdbool( is_persistent_object( get_token_abs( statement-from + 1 ) ) = abap_false
AND is_persistent_object( get_token_abs( statement-from + 2 ) ) = abap_false ).
ENDMETHOD.
ENDCLASS.
```
| 2,814 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
REPORT zcute_main.
PARAMETERS p_table TYPE tabname16 DEFAULT 'ZCUTE_TEST'.
CLASS lcl_cute_source_information DEFINITION.
PUBLIC SECTION.
CLASS-METHODS get_instance
IMPORTING
source TYPE tabname16
RETURNING
VALUE(instance) TYPE REF TO lcl_cute_source_information.
METHODS read_source
IMPORTING
source TYPE tabname16.
DATA header TYPE dd02v.
DATA technical TYPE dd09v.
DATA components TYPE STANDARD TABLE OF dd03p.
ENDCLASS.
CLASS lcl_cute_source_information IMPLEMENTATION.
METHOD get_instance.
instance = NEW lcl_cute_source_information( ).
instance->read_source( source ).
ENDMETHOD.
METHOD read_source.
DATA source_name TYPE ddobjname.
source_name = source.
CALL FUNCTION 'DDIF_TABL_GET'
EXPORTING
name = source_name
state = 'A'
langu = sy-langu
IMPORTING
dd02v_wa = header
TABLES
dd03p_tab = components
EXCEPTIONS
illegal_input = 1
OTHERS = 2.
IF sy-subrc = 0.
ENDIF.
ENDMETHOD.
ENDCLASS.
CLASS lcl_cute_tab_helper DEFINITION.
PUBLIC SECTION.
CLASS-METHODS get_instance
IMPORTING
source_info TYPE REF TO lcl_cute_source_information
RETURNING
VALUE(instance) TYPE REF TO lcl_cute_tab_helper.
METHODS set_source
IMPORTING
source_info TYPE REF TO lcl_cute_source_information.
METHODS get_components
RETURNING
VALUE(components) TYPE cl_abap_structdescr=>component_table.
METHODS set_components
IMPORTING
components TYPE cl_abap_structdescr=>component_table.
METHODS get_data_reference_edit
RETURNING
VALUE(dataref) TYPE REF TO data.
METHODS get_data_reference_origin
RETURNING
VALUE(dataref) TYPE REF TO data.
METHODS get_field_catalog
RETURNING
VALUE(fcat) TYPE lvc_t_fcat.
PRIVATE SECTION.
METHODS create.
DATA struc_origin_descr TYPE REF TO cl_abap_structdescr.
DATA table_origin_descr TYPE REF TO cl_abap_tabledescr.
DATA table_origin_data TYPE REF TO data.
DATA table_edit_data TYPE REF TO data.
DATA table_edit_descr TYPE REF TO cl_abap_tabledescr.
DATA struc_edit_descr TYPE REF TO cl_abap_structdescr.
DATA source_information TYPE REF TO lcl_cute_source_information.
DATA components TYPE cl_abap_structdescr=>component_table.
ENDCLASS.
CLASS lcl_cute_tab_helper IMPLEMENTATION.
METHOD get_instance.
instance = NEW lcl_cute_tab_helper( ).
instance->set_source( source_info ).
instance->create( ).
ENDMETHOD.
METHOD create.
struc_origin_descr = CAST cl_abap_structdescr( cl_abap_structdescr=>describe_by_name( source_information->header-tabname ) ).
"Needed to save data
table_origin_descr = cl_abap_tabledescr=>create(
p_line_type = struc_origin_descr
p_table_kind = cl_abap_tabledescr=>tablekind_std
p_unique = abap_false ).
CREATE DATA table_origin_data TYPE HANDLE table_origin_descr.
"Adapt editable structure
components = struc_origin_descr->get_components( ).
APPEND VALUE #( name = '_COLOR_' type = CAST cl_abap_datadescr( cl_abap_structdescr=>describe_by_name( 'LVC_T_SCOL' ) ) )
TO components.
struc_edit_descr = cl_abap_structdescr=>create( components ).
table_edit_descr = cl_abap_tabledescr=>create(
p_line_type = struc_edit_descr
p_table_kind = cl_abap_tabledescr=>tablekind_std
p_unique = abap_false ).
CREATE DATA table_edit_data TYPE HANDLE table_edit_descr.
ENDMETHOD.
METHOD set_components.
ENDMETHOD.
METHOD get_components.
ENDMETHOD.
METHOD get_data_reference_edit.
dataref = table_edit_data.
ENDMETHOD.
METHOD get_data_reference_origin.
dataref = table_origin_data.
ENDMETHOD.
METHOD set_source.
source_information = source_info.
ENDMETHOD.
METHOD get_field_catalog.
DATA element_descr TYPE REF TO cl_abap_elemdescr.
DATA field_descr TYPE dfies.
* data(view_components) = struc_edit_descr->get_included_view( ).
LOOP AT components INTO DATA(component).
TRY.
element_descr ?= component-type.
field_descr = element_descr->get_ddic_field( ).
CHECK field_descr-datatype <> 'CLNT'.
APPEND INITIAL LINE TO fcat ASSIGNING FIELD-SYMBOL(<field>).
MOVE-CORRESPONDING field_descr TO <field>.
<field>-fieldname = component-name.
<field>-reptext = field_descr-fieldname.
<field>-scrtext_s = field_descr-fieldname.
<field>-scrtext_m = field_descr-fieldname.
<field>-scrtext_l = field_descr-fieldname.
<field>-ref_table = source_information->header-tabname.
<field>-edit = abap_true.
CATCH cx_sy_move_cast_error.
CONTINUE.
ENDTRY.
ENDLOOP.
ENDMETHOD.
ENDCLASS.
INTERFACE lif_cute.
METHODS edit.
METHODS save.
METHODS check.
METHODS read.
METHODS map_edit_to_origin.
METHODS map_origin_to_edit.
METHODS set_source
IMPORTING
source_info TYPE REF TO lcl_cute_source_information.
DATA source_information TYPE REF TO lcl_cute_source_information.
DATA table_helper TYPE REF TO lcl_cute_tab_helper.
ENDINTERFACE.
CLASS lcx_cute DEFINITION INHERITING FROM cx_static_check. ENDCLASS.
CLASS lcx_cute_unsupported_category DEFINITION INHERITING FROM lcx_cute. ENDCLASS.
CLASS lcl_cute_table DEFINITION.
PUBLIC SECTION.
INTERFACES lif_cute.
PRIVATE SECTION.
DATA grid TYPE REF TO cl_gui_alv_grid.
METHODS edit_grid.
METHODS grid_excluded_functions
RETURNING
VALUE(functions) TYPE ui_functions.
METHODS handle_data_changed
FOR EVENT data_changed OF cl_gui_alv_grid
IMPORTING
er_data_changed
e_ucomm
e_onf4
e_onf4_after
e_onf4_before.
METHODS handle_toolbar
FOR EVENT toolbar OF cl_gui_alv_grid
IMPORTING
e_object
e_interactive.
METHODS handle_user_command
FOR EVENT user_command OF cl_gui_alv_grid
IMPORTING
e_ucomm.
ENDCLASS.
CLASS lcl_cute_table IMPLEMENTATION.
METHOD lif_cute~edit.
lif_cute~table_helper = lcl_cute_tab_helper=>get_instance( lif_cute~source_information ).
lif_cute~read( ).
edit_grid( ).
ENDMETHOD.
METHOD lif_cute~set_source.
lif_cute~source_information = source_info.
ENDMETHOD.
METHOD lif_cute~read.
FIELD-SYMBOLS <table> TYPE table.
DATA(tabref) = lif_cute~table_helper->get_data_reference_origin( ).
ASSIGN tabref->* TO <table>.
SELECT * FROM (lif_cute~source_information->header-tabname)
INTO TABLE <table>.
lif_cute~map_origin_to_edit( ).
ENDMETHOD.
METHOD lif_cute~save.
FIELD-SYMBOLS <origin_data> TYPE table.
lif_cute~map_edit_to_origin( ).
DATA(origin_data) = lif_cute~table_helper->get_data_reference_origin( ).
ASSIGN origin_data->* TO <origin_data>.
MODIFY (lif_cute~source_information->header-tabname)
FROM TABLE <origin_data>.
IF sy-subrc = 0.
MESSAGE 'data has been saved.'(svs) TYPE 'S'.
ELSE.
MESSAGE 'Error saving data... ;('(sve) TYPE 'I'.
ENDIF.
ENDMETHOD.
METHOD lif_cute~check.
ENDMETHOD.
METHOD edit_grid.
FIELD-SYMBOLS <edit_data> TYPE table.
DATA(edit_data) = lif_cute~table_helper->get_data_reference_edit( ).
ASSIGN edit_data->* TO <edit_data>.
grid = NEW #(
i_parent = cl_gui_container=>screen0
i_appl_events = ' ' ).
grid->register_edit_event( cl_gui_alv_grid=>mc_evt_enter ).
grid->set_ready_for_input( 1 ).
SET HANDLER handle_data_changed FOR grid.
SET HANDLER handle_user_command FOR grid.
SET HANDLER handle_toolbar FOR grid.
DATA layout TYPE lvc_s_layo.
DATA(fcat) = lif_cute~table_helper->get_field_catalog( ).
grid->set_table_for_first_display(
EXPORTING
is_variant = VALUE #( handle = 'GRID' report = sy-repid username = sy-uname )
i_save = 'A'
i_default = abap_true
is_layout = layout
it_toolbar_excluding = grid_excluded_functions( )
CHANGING
it_outtab = <edit_data>
it_fieldcatalog = fcat
EXCEPTIONS
invalid_parameter_combination = 1
program_error = 2
too_many_lines = 3
OTHERS = 4 ).
IF sy-subrc = 0.
grid->set_toolbar_interactive( ).
WRITE space.
ENDIF.
ENDMETHOD.
METHOD grid_excluded_functions.
APPEND cl_gui_alv_grid=>mc_mb_view TO functions.
APPEND cl_gui_alv_grid=>mc_fc_reprep TO functions.
APPEND cl_gui_alv_grid=>mc_fc_maximum TO functions.
APPEND cl_gui_alv_grid=>mc_fc_minimum TO functions.
APPEND cl_gui_alv_grid=>mc_mb_sum TO functions.
APPEND cl_gui_alv_grid=>mc_mb_subtot TO functions.
APPEND cl_gui_alv_grid=>mc_fc_graph TO functions.
ENDMETHOD.
METHOD lif_cute~map_edit_to_origin.
DATA(origin_data) = lif_cute~table_helper->get_data_reference_origin( ).
DATA(edit_data) = lif_cute~table_helper->get_data_reference_edit( ).
FIELD-SYMBOLS <origin_data> TYPE table.
FIELD-SYMBOLS <edit_data> TYPE table.
ASSIGN origin_data->* TO <origin_data>.
ASSIGN edit_data->* TO <edit_data>.
<origin_data> = CORRESPONDING #( <edit_data> ).
ENDMETHOD.
METHOD lif_cute~map_origin_to_edit.
DATA(origin_data) = lif_cute~table_helper->get_data_reference_origin( ).
DATA(edit_data) = lif_cute~table_helper->get_data_reference_edit( ).
FIELD-SYMBOLS <origin_data> TYPE table.
FIELD-SYMBOLS <edit_data> TYPE table.
ASSIGN origin_data->* TO <origin_data>.
ASSIGN edit_data->* TO <edit_data>.
<edit_data> = CORRESPONDING #( <origin_data> ).
ENDMETHOD.
METHOD handle_data_changed.
ENDMETHOD.
METHOD handle_toolbar.
DATA button TYPE stb_button.
CLEAR button.
button-butn_type = 3. "Separator
APPEND button TO e_object->mt_toolbar.
"add save button
CLEAR button.
button-function = 'SAVE'.
button-icon = icon_system_save.
button-quickinfo = 'Save data'(svq).
button-butn_type = '0'. "normal Button
button-disabled = ' '.
APPEND button TO e_object->mt_toolbar.
ENDMETHOD.
METHOD handle_user_command.
CASE e_ucomm.
WHEN 'SAVE'.
lif_cute~save( ).
WHEN OTHERS.
ENDCASE.
ENDMETHOD.
ENDCLASS.
CLASS lcl_cute_main DEFINITION.
PUBLIC SECTION.
CLASS-METHODS get_instance
IMPORTING
source TYPE tabname16
RETURNING
VALUE(instance) TYPE REF TO lif_cute
RAISING
lcx_cute.
PROTECTED SECTION.
ENDCLASS.
CLASS lcl_cute_main IMPLEMENTATION.
METHOD get_instance.
DATA(source_info) = lcl_cute_source_information=>get_instance( source ).
CASE source_info->header-tabclass.
WHEN 'TRANSP'.
instance = NEW lcl_cute_table( ).
instance->set_source( source_info ).
WHEN 'VIEW'.
WHEN OTHERS.
RAISE EXCEPTION TYPE lcx_cute_unsupported_category.
ENDCASE.
ENDMETHOD.
ENDCLASS.
START-OF-SELECTION.
TRY.
DATA(cute) = lcl_cute_main=>get_instance( p_table ).
cute->edit( ).
CATCH lcx_cute.
MESSAGE 'error' TYPE 'I'.
ENDTRY.
```
|
I found vulnerabilities in the line:
```abap
SELECT * FROM (lif_cute~source_information->header-tabname)
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
MODIFY (lif_cute~source_information->header-tabname)
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
REPORT zcute_main.
PARAMETERS p_table TYPE typename DEFAULT 'ZCUTE_TEST'.
PARAMETERS p_edit TYPE flag RADIOBUTTON GROUP m DEFAULT 'X' USER-COMMAND onli.
PARAMETERS p_show TYPE flag RADIOBUTTON GROUP m .
CLASS lcl_main DEFINITION.
PUBLIC SECTION.
METHODS pbo
IMPORTING
edit TYPE flag.
METHODS pai
IMPORTING
ucomm TYPE syucomm.
METHODS set_status.
METHODS ask_save_data
RETURNING
VALUE(result) TYPE flag.
PRIVATE SECTION.
DATA cc TYPE REF TO cl_gui_custom_container.
DATA cute TYPE REF TO zif_cute.
ENDCLASS.
CLASS lcl_main IMPLEMENTATION.
METHOD pbo.
set_status( ).
TRY.
cute = zcl_cute_main=>get_instance( p_table ).
IF cc IS INITIAL.
cc = NEW #( container_name = 'CC' ).
ENDIF.
cute->set_container( cc ).
IF edit = abap_true.
cute->edit( ).
ELSE.
cute->show( ).
ENDIF.
cl_gui_container=>set_focus( cc ).
CATCH zcx_cute INTO DATA(error).
MESSAGE error TYPE 'E' DISPLAY LIKE 'I'.
ENDTRY.
ENDMETHOD.
METHOD pai.
CASE sy-ucomm.
WHEN 'BACK' OR 'HOME' OR 'CANCEL'.
IF cute->check_input( ) = abap_false.
MESSAGE 'input error' TYPE 'S'.
ENDIF.
IF cute->check_unsaved_data( ) = abap_true.
DATA(answer) = ask_save_data( ).
CASE answer.
WHEN '1'.
cute->save( ).
SET SCREEN 0.
LEAVE SCREEN.
WHEN '2'.
SET SCREEN 0.
LEAVE SCREEN.
WHEN 'A'.
RETURN.
ENDCASE.
ELSE.
SET SCREEN 0.
LEAVE SCREEN.
ENDIF.
WHEN OTHERS.
ENDCASE.
ENDMETHOD.
METHOD ask_save_data.
DATA answer TYPE c LENGTH 1.
CALL FUNCTION 'POPUP_TO_CONFIRM'
EXPORTING
titlebar = 'unsaved data'(001)
text_question = 'Save data before leaving?'(002)
text_button_1 = 'Yes, please'(yes)
icon_button_1 = 'ICON_SYSTEM_SAVE'
text_button_2 = 'No, thanks'(ano)
icon_button_2 = 'ICON_SYSTEM_BACK'
default_button = '1'
display_cancel_button = 'X'
start_column = 25
start_row = 6
popup_type = 'ICON_MESSAGE_QUESTION'
IMPORTING
answer = answer
EXCEPTIONS
text_not_found = 1
OTHERS = 2.
IF sy-subrc = 0.
result = answer.
ENDIF.
ENDMETHOD.
METHOD set_status.
SET PF-STATUS '100'.
IF p_edit = abap_true.
SET TITLEBAR 'EDIT' WITH p_table.
ELSE.
SET TITLEBAR 'SHOW' WITH p_table.
ENDIF.
ENDMETHOD.
ENDCLASS.
DATA main TYPE REF TO lcl_main.
START-OF-SELECTION.
CALL SCREEN 100.
MODULE status_0100 OUTPUT.
CHECK main IS INITIAL.
main = NEW #( ).
main->pbo( p_edit ).
ENDMODULE.
MODULE user_command_0100 INPUT.
main->pai( sy-ucomm ).
ENDMODULE.
```
| 2,816 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
class ZCL_ABAPGIT_USER_EXIT definition
public
final
create public .
public section.
interfaces ZIF_ABAPGIT_EXIT .
protected section.
private section.
ENDCLASS.
CLASS ZCL_ABAPGIT_USER_EXIT IMPLEMENTATION.
method ZIF_ABAPGIT_EXIT~ADJUST_DISPLAY_COMMIT_URL.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~ADJUST_DISPLAY_FILENAME.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~ALLOW_SAP_OBJECTS.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~CHANGE_LOCAL_HOST.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~CHANGE_PROXY_AUTHENTICATION.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~CHANGE_PROXY_PORT.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~CHANGE_PROXY_URL.
return.
endmethod.
method zif_abapgit_exit~change_supported_data_objects.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~CHANGE_SUPPORTED_OBJECT_TYPES.
constants lc_tabname type c length 30 value '/NEPTUNE/ATY' ##no_text.
constants lc_fieldname type c length 30 value 'OBJECT_TYPE' ##no_text.
data lv_tabname type dd02l-tabname.
data lt_ref type ref to data.
field-symbols: <lt_standard_table> type standard table.
field-symbols: <ls_line> type any.
field-symbols: <lv_field> type any.
select single tabname from dd02l into lv_tabname
where tabname = lc_tabname.
check sy-subrc = 0.
create data lt_ref type standard table of (lc_tabname) with non-unique default key.
assign lt_ref->* to <lt_standard_table>.
select *
from (lc_tabname)
into table <lt_standard_table>.
check sy-subrc = 0 and <lt_standard_table> is not initial.
loop at <lt_standard_table> assigning <ls_line>.
assign component lc_fieldname of structure <ls_line> to <lv_field> casting type tadir-object.
if sy-subrc = 0.
append <lv_field> to ct_types.
endif.
endloop.
endmethod.
method zif_abapgit_exit~change_tadir.
data: lt_neptadir type /neptune/if_artifact_type=>ty_t_lcl_tadir.
data lt_api type standard table of /neptune/api.
data ls_api like line of lt_api.
data lt_app type standard table of /neptune/_app.
data ls_app like line of lt_app.
field-symbols <fs_tadir> like line of ct_tadir.
field-symbols <fs_neptadir> like line of lt_neptadir.
**********************************************************************
* break andrec.
check iv_package = '$NEPTUNE_GIT_TESTING'.
try.
" Ongoing from DXP 23 fetch wie tadir framework (all artifacts can be assigned to a devclass)
call method ('/NEPTUNE/CL_TADIR')=>('GET_TADIR_FOR_DEVCLASS') ##CALLED
* call method /neptune/cl_tadir=>get_tadir_for_devclass
exporting
iv_devclass = iv_package
importing
et_tadir = lt_neptadir.
catch cx_sy_dyn_call_illegal_class
cx_sy_dyn_call_illegal_method.
refresh lt_neptadir.
" From version bellow DXP 23 we only support applications and apis
select *
from /neptune/api
into corresponding fields of table lt_api
where devclass = iv_package.
if sy-subrc = 0.
loop at lt_api into ls_api.
append initial line to lt_neptadir assigning <fs_neptadir>.
if sy-subrc = 0.
<fs_neptadir>-artifact_type = 'API'.
<fs_neptadir>-key_mandt = '000'.
<fs_neptadir>-key1 = ls_api-name.
<fs_neptadir>-key1 = ls_api-apiid.
* <fs_neptadir>-devclass = ls_api-devclass.
<fs_neptadir>-artifact_name = ls_api-name.
<fs_neptadir>-object_type = 'ZN02'. " API
endif.
endloop.
endif.
select *
from /neptune/_app
into corresponding fields of table lt_app
where devclass = iv_package.
if sy-subrc = 0.
loop at lt_app into ls_app.
append initial line to lt_neptadir assigning <fs_neptadir>.
if sy-subrc = 0.
<fs_neptadir>-artifact_type = 'APP'.
<fs_neptadir>-key_mandt = '000'.
<fs_neptadir>-key1 = ls_app-applid.
<fs_neptadir>-devclass = ls_app-devclass.
<fs_neptadir>-artifact_name = ls_app-applid.
<fs_neptadir>-object_type = 'ZN01'. " APP
endif.
endloop.
endif.
endtry.
loop at lt_neptadir assigning <fs_neptadir>.
append initial line to ct_tadir assigning <fs_tadir>.
if sy-subrc = 0.
<fs_tadir>-pgmid = 'R3TR'.
<fs_tadir>-object = <fs_neptadir>-object_type.
* if <fs_neptadir>-object_type ne 'ZN05'.
<fs_tadir>-obj_name = <fs_neptadir>-key1.
* else.
* <fs_tadir>-obj_name = <fs_neptadir>-artifact_name.
* endif.
<fs_tadir>-devclass = iv_package.
<fs_tadir>-path = '/src/' .
<fs_tadir>-srcsystem = sy-sysid.
endif.
endloop.
endmethod.
method ZIF_ABAPGIT_EXIT~CREATE_HTTP_CLIENT.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~CUSTOM_SERIALIZE_ABAP_CLIF.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~DESERIALIZE_POSTPROCESS.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~DETERMINE_TRANSPORT_REQUEST.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~ENHANCE_REPO_TOOLBAR.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~GET_CI_TESTS.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~GET_SSL_ID.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~HTTP_CLIENT.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~ON_EVENT.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~PRE_CALCULATE_REPO_STATUS.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~SERIALIZE_POSTPROCESS.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~VALIDATE_BEFORE_PUSH.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~WALL_MESSAGE_LIST.
return.
endmethod.
method ZIF_ABAPGIT_EXIT~WALL_MESSAGE_REPO.
return.
endmethod.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
select * * <-- There is a problem here
from (lc_tabname)
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
class zcl_abapgit_user_exit definition
public
final
create public .
public section.
interfaces zif_abapgit_exit .
protected section.
private section.
endclass.
class zcl_abapgit_user_exit implementation.
method zif_abapgit_exit~adjust_display_commit_url.
return.
endmethod.
method zif_abapgit_exit~adjust_display_filename.
return.
endmethod.
method zif_abapgit_exit~allow_sap_objects.
return.
endmethod.
method zif_abapgit_exit~change_local_host.
return.
endmethod.
method zif_abapgit_exit~change_proxy_authentication.
return.
endmethod.
method zif_abapgit_exit~change_proxy_port.
return.
endmethod.
method zif_abapgit_exit~change_proxy_url.
return.
endmethod.
method zif_abapgit_exit~change_supported_data_objects.
return.
endmethod.
method zif_abapgit_exit~change_supported_object_types.
data: lt_neptune_types type /neptune/cl_abapgit_user_exit=>ty_object_types_tt,
ls_neptune_types like line of lt_neptune_types.
data ls_types like line of ct_types.
lt_neptune_types = /neptune/cl_abapgit_user_exit=>change_supported_object_types( ).
loop at lt_neptune_types into ls_neptune_types.
ls_types = ls_neptune_types.
append ls_types to ct_types.
endloop.
endmethod.
method zif_abapgit_exit~change_tadir.
data: lt_neptune_tadir type /neptune/cl_abapgit_user_exit=>ty_tadir_tt,
ls_neptune_tadir like line of lt_neptune_tadir.
data ls_tadir like line of ct_tadir.
lt_neptune_tadir = /neptune/cl_abapgit_user_exit=>change_tadir( iv_package = iv_package ).
loop at lt_neptune_tadir into ls_neptune_tadir.
move-corresponding ls_neptune_tadir to ls_tadir.
append ls_tadir to ct_tadir.
endloop.
endmethod.
method zif_abapgit_exit~create_http_client.
return.
endmethod.
method zif_abapgit_exit~custom_serialize_abap_clif.
return.
endmethod.
method zif_abapgit_exit~deserialize_postprocess.
return.
endmethod.
method zif_abapgit_exit~determine_transport_request.
return.
endmethod.
method zif_abapgit_exit~enhance_repo_toolbar.
return.
endmethod.
method zif_abapgit_exit~get_ci_tests.
return.
endmethod.
method zif_abapgit_exit~get_ssl_id.
return.
endmethod.
method zif_abapgit_exit~http_client.
return.
endmethod.
method zif_abapgit_exit~on_event.
return.
endmethod.
method zif_abapgit_exit~pre_calculate_repo_status.
return.
endmethod.
method zif_abapgit_exit~serialize_postprocess.
return.
endmethod.
method zif_abapgit_exit~validate_before_push.
return.
endmethod.
method zif_abapgit_exit~wall_message_list.
return.
endmethod.
method zif_abapgit_exit~wall_message_repo.
return.
endmethod.
endclass.
```
| 2,817 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD insert_program.
CALL FUNCTION 'RPY_PROGRAM_INSERT'
EXPORTING
development_class = iv_package
program_name = is_progdir-name
program_type = is_progdir-subc
title_string = iv_title
save_inactive = 'I'
suppress_dialog = abap_true
TABLES
source_extended = it_source
EXCEPTIONS
already_exists = 1
cancelled = 2
name_not_allowed = 3
permission_error = 4
OTHERS = 5.
IF sy-subrc = 3.
" For cases that standard function does not handle (like FUGR),
" we save active and inactive version of source with the given PROGRAM TYPE.
" Without the active version, the code will not be visible in case of activation errors.
INSERT REPORT is_progdir-name
FROM it_source
STATE 'A'
PROGRAM TYPE is_progdir-subc.
INSERT REPORT is_progdir-name
FROM it_source
STATE 'I'
PROGRAM TYPE is_progdir-subc.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'Error from INSERT REPORT .. PROGRAM TYPE' ).
ENDIF.
ELSEIF sy-subrc > 0.
zcx_abapgit_exception=>raise_t100( ).
ENDIF.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT.
```abap
PROGRAM TYPE is_progdir-subc.
INSERT REPORT is_progdir-name * <-- There is a problem here
FROM it_source
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
METHOD insert_program.
TRY.
CALL FUNCTION 'RPY_PROGRAM_INSERT'
EXPORTING
development_class = iv_package
program_name = is_progdir-name
program_type = is_progdir-subc
title_string = iv_title
save_inactive = c_state-inactive
suppress_dialog = abap_true
uccheck = is_progdir-uccheck
TABLES
source_extended = it_source
EXCEPTIONS
already_exists = 1
cancelled = 2
name_not_allowed = 3
permission_error = 4
OTHERS = 5.
CATCH cx_sy_dyn_call_param_not_found.
CALL FUNCTION 'RPY_PROGRAM_INSERT'
EXPORTING
development_class = iv_package
program_name = is_progdir-name
program_type = is_progdir-subc
title_string = iv_title
save_inactive = c_state-inactive
suppress_dialog = abap_true
TABLES
source_extended = it_source
EXCEPTIONS
already_exists = 1
cancelled = 2
name_not_allowed = 3
permission_error = 4
OTHERS = 5.
ENDTRY.
IF sy-subrc = 3.
zcl_abapinst_factory=>get_sap_report( )->insert_report(
iv_name = is_progdir-name
iv_package = iv_package
it_source = it_source
iv_state = c_state-active
iv_version = is_progdir-uccheck
iv_program_type = is_progdir-subc ).
zcl_abapinst_factory=>get_sap_report( )->insert_report(
iv_name = is_progdir-name
iv_package = iv_package
it_source = it_source
iv_state = c_state-inactive
iv_version = is_progdir-uccheck
iv_program_type = is_progdir-subc ).
ELSEIF sy-subrc > 0.
zcx_abapgit_exception=>raise_t100( ).
ENDIF.
ENDMETHOD.
```
| 2,818 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD create_report.
INSERT REPORT iv_program FROM it_source EXTENSION TYPE iv_extension STATE iv_version PROGRAM TYPE iv_program_type.
ASSERT sy-subrc = 0.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
INSERT REPORT iv_program FROM it_source EXTENSION TYPE iv_extension STATE iv_version PROGRAM TYPE iv_program_type.
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
METHOD create_report.
zcl_abapinst_factory=>get_sap_report( )->insert_report(
iv_name = iv_program
iv_package = iv_package
it_source = it_source
iv_state = iv_state
iv_version = iv_version
iv_program_type = iv_program_type
iv_extension_type = iv_extension ).
ENDMETHOD.
```
| 2,819 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD delete_report.
DELETE REPORT iv_program ##SUBRC_OK.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
DELETE REPORT iv_program ##SUBRC_OK.
```
Explanation: Potential dangerous statement DELETE REPORT.
Suggested fix:
```abap
METHOD delete_report.
zcl_abapinst_factory=>get_sap_report( )->delete_report( iv_program ).
ENDMETHOD.
```
| 2,820 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD update_report.
DATA: lt_old TYPE string_table.
READ REPORT iv_program INTO lt_old.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( |Fatal error. Include { iv_program } should have been created previously!| ).
ENDIF.
IF lt_old <> it_source.
INSERT REPORT iv_program FROM it_source.
ASSERT sy-subrc = 0.
rv_updated = abap_true.
ELSE.
rv_updated = abap_false.
ENDIF.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
INSERT REPORT iv_program FROM it_source.
```
Explanation: Potential dangerous statement INSERT REPORT.
```abap
INSERT REPORT iv_program FROM it_source.
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
METHOD update_report.
DATA lv_type TYPE c LENGTH 1.
lv_type = zcl_abapgit_oo_base=>c_include_program_type.
IF iv_program+30 = srext_ext_class_pool.
lv_type = zcl_abapgit_oo_base=>c_cp_program_type.
ENDIF.
rv_updated = zcl_abapinst_factory=>get_sap_report( )->update_report(
iv_name = iv_program
iv_package = iv_package
iv_version = iv_version
it_source = it_source
iv_program_type = lv_type ).
ENDMETHOD.
```
| 2,821 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD deserialize_functions.
DATA: lv_include TYPE rs38l-include,
lv_area TYPE rs38l-area,
lv_group TYPE rs38l-area,
lv_namespace TYPE rs38l-namespace,
lt_source TYPE TABLE OF abaptxt255,
lv_msg TYPE string,
lx_error TYPE REF TO zcx_abapgit_exception.
FIELD-SYMBOLS: <ls_func> LIKE LINE OF it_functions.
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = zif_abapgit_object~mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_INCLUDE_SPLIT'
EXPORTING
complete_area = lv_area
IMPORTING
namespace = lv_namespace
group = lv_group
EXCEPTIONS
OTHERS = 12.
IF sy-subrc <> 0.
MESSAGE ID sy-msgid TYPE 'S' NUMBER sy-msgno WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4 INTO lv_msg.
ii_log->add_error( iv_msg = |Function module { <ls_func>-funcname }: { lv_msg }|
is_item = ms_item ).
CONTINUE. "with next function module
ENDIF.
CALL FUNCTION 'FUNCTION_EXISTS'
EXPORTING
funcname = <ls_func>-funcname
IMPORTING
include = lv_include
EXCEPTIONS
function_not_exist = 1.
IF sy-subrc = 0.
* delete the function module to make sure the parameters are updated
* havent found a nice way to update the paramters
CALL FUNCTION 'FUNCTION_DELETE'
EXPORTING
funcname = <ls_func>-funcname
suppress_success_message = abap_true
EXCEPTIONS
error_message = 1
OTHERS = 2.
IF sy-subrc <> 0.
MESSAGE ID sy-msgid TYPE 'S' NUMBER sy-msgno WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4 INTO lv_msg.
ii_log->add_error( iv_msg = |Function module { <ls_func>-funcname }: { lv_msg }|
is_item = ms_item ).
CONTINUE. "with next function module
ENDIF.
ENDIF.
TRY.
check_rfc_parameters( <ls_func> ).
CATCH zcx_abapgit_exception INTO lx_error.
ii_log->add_error(
iv_msg = |Function module { <ls_func>-funcname }: { lx_error->get_text( ) }|
is_item = ms_item ).
CONTINUE. "with next function module
ENDTRY.
CALL FUNCTION 'RS_FUNCTIONMODULE_INSERT'
EXPORTING
funcname = <ls_func>-funcname
function_pool = lv_group
interface_global = <ls_func>-global_flag
remote_call = <ls_func>-remote_call
short_text = <ls_func>-short_text
update_task = <ls_func>-update_task
exception_class = <ls_func>-exception_classes
namespace = lv_namespace
remote_basxml_supported = <ls_func>-remote_basxml
corrnum = iv_transport
IMPORTING
function_include = lv_include
TABLES
import_parameter = <ls_func>-import
export_parameter = <ls_func>-export
tables_parameter = <ls_func>-tables
changing_parameter = <ls_func>-changing
exception_list = <ls_func>-exception
parameter_docu = <ls_func>-documentation
EXCEPTIONS
double_task = 1
error_message = 2
function_already_exists = 3
invalid_function_pool = 4
invalid_name = 5
too_many_functions = 6
no_modify_permission = 7
no_show_permission = 8
enqueue_system_failure = 9
canceled_in_corr = 10
OTHERS = 11.
IF sy-subrc <> 0.
MESSAGE ID sy-msgid TYPE 'S' NUMBER sy-msgno WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4 INTO lv_msg.
ii_log->add_error( iv_msg = |Function module { <ls_func>-funcname }: { lv_msg }|
is_item = ms_item ).
CONTINUE. "with next function module
ENDIF.
INSERT REPORT lv_include FROM lt_source.
ii_log->add_success( iv_msg = |Function module { <ls_func>-funcname } imported|
is_item = ms_item ).
ENDLOOP.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
INSERT REPORT lv_include FROM lt_source.
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
METHOD deserialize_functions.
DATA: lv_include TYPE rs38l-include,
lv_area TYPE rs38l-area,
lv_group TYPE rs38l-area,
lv_namespace TYPE rs38l-namespace,
lt_source TYPE TABLE OF abaptxt255,
lv_msg TYPE string,
lx_error TYPE REF TO zcx_abapgit_exception.
FIELD-SYMBOLS: <ls_func> LIKE LINE OF it_functions.
LOOP AT it_functions ASSIGNING <ls_func>.
lt_source = zif_abapgit_object~mo_files->read_abap( iv_extra = <ls_func>-funcname ).
lv_area = ms_item-obj_name.
CALL FUNCTION 'FUNCTION_INCLUDE_SPLIT'
EXPORTING
complete_area = lv_area
IMPORTING
namespace = lv_namespace
group = lv_group
EXCEPTIONS
OTHERS = 12.
IF sy-subrc <> 0.
MESSAGE ID sy-msgid TYPE 'S' NUMBER sy-msgno WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4 INTO lv_msg.
ii_log->add_error( iv_msg = |Function module { <ls_func>-funcname }: { lv_msg }|
is_item = ms_item ).
CONTINUE.
ENDIF.
IF zcl_abapinst_factory=>get_function_module( )->function_exists( <ls_func>-funcname ) = abap_true.
CALL FUNCTION 'FUNCTION_DELETE'
EXPORTING
funcname = <ls_func>-funcname
suppress_success_message = abap_true
EXCEPTIONS
error_message = 1
OTHERS = 2.
IF sy-subrc <> 0.
MESSAGE ID sy-msgid TYPE 'S' NUMBER sy-msgno WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4 INTO lv_msg.
ii_log->add_error( iv_msg = |Function module { <ls_func>-funcname }: { lv_msg }|
is_item = ms_item ).
CONTINUE.
ENDIF.
ENDIF.
TRY.
check_rfc_parameters( <ls_func> ).
CATCH zcx_abapgit_exception INTO lx_error.
ii_log->add_error(
iv_msg = |Function module { <ls_func>-funcname }: { lx_error->get_text( ) }|
is_item = ms_item ).
CONTINUE.
ENDTRY.
CALL FUNCTION 'RS_FUNCTIONMODULE_INSERT'
EXPORTING
funcname = <ls_func>-funcname
function_pool = lv_group
interface_global = <ls_func>-global_flag
remote_call = <ls_func>-remote_call
short_text = <ls_func>-short_text
update_task = <ls_func>-update_task
exception_class = <ls_func>-exception_classes
namespace = lv_namespace
remote_basxml_supported = <ls_func>-remote_basxml
corrnum = iv_transport
IMPORTING
function_include = lv_include
TABLES
import_parameter = <ls_func>-import
export_parameter = <ls_func>-export
tables_parameter = <ls_func>-tables
changing_parameter = <ls_func>-changing
exception_list = <ls_func>-exception
parameter_docu = <ls_func>-documentation
EXCEPTIONS
double_task = 1
error_message = 2
function_already_exists = 3
invalid_function_pool = 4
invalid_name = 5
too_many_functions = 6
no_modify_permission = 7
no_show_permission = 8
enqueue_system_failure = 9
canceled_in_corr = 10
OTHERS = 11.
IF sy-subrc <> 0.
MESSAGE ID sy-msgid TYPE 'S' NUMBER sy-msgno WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4 INTO lv_msg.
ii_log->add_error( iv_msg = |Function module { <ls_func>-funcname }: { lv_msg }|
is_item = ms_item ).
CONTINUE.
ENDIF.
zcl_abapinst_factory=>get_sap_report( )->insert_report(
iv_name = lv_include
iv_package = iv_package
iv_version = iv_version
it_source = lt_source ).
ii_log->add_success( iv_msg = |Function module { <ls_func>-funcname } imported|
is_item = ms_item ).
ENDLOOP.
ENDMETHOD.
```
| 2,822 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD deserialize_with_ext.
" Special treatment for extensions
" If the program name exceeds 30 characters it is not a usual ABAP program but might be
" some extension, which requires the internal addition EXTENSION TYPE
" https://help.sap.com/doc/abapdocu_755_index_htm/7.55/en-US/index.htm?file=abapinsert_report_internal.htm
" This e.g. occurs in case of transportable Code Inspector variants (ending with ===VC)
INSERT REPORT is_progdir-name
FROM it_source
STATE 'I'
EXTENSION TYPE is_progdir-name+30
PROGRAM TYPE is_progdir-subc.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'Error from INSERT REPORT .. EXTENSION TYPE' ).
ENDIF.
CALL FUNCTION 'UPDATE_PROGDIR'
EXPORTING
i_progdir = is_progdir
i_progname = is_progdir-name
i_state = 'I'
EXCEPTIONS
not_executed = 1
OTHERS = 2.
IF sy-subrc <> 0.
zcx_abapgit_exception=>raise( 'Error updating program directory' ).
ENDIF.
zcl_abapgit_objects_activation=>add(
iv_type = 'REPS'
iv_name = is_progdir-name ).
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
INSERT REPORT is_progdir-name
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
METHOD deserialize_with_ext.
zcl_abapinst_factory=>get_sap_report( )->insert_report(
iv_name = is_progdir-name
iv_package = iv_package
it_source = it_source
iv_state = 'I'
iv_version = is_progdir-uccheck
iv_program_type = is_progdir-subc
iv_extension_type = is_progdir-name+30 ).
zcl_abapinst_factory=>get_sap_report( )->update_progdir(
is_progdir = is_progdir
iv_state = 'I'
iv_package = iv_package ).
zcl_abapgit_objects_activation=>add(
iv_type = 'REPS'
iv_name = is_progdir-name ).
ENDMETHOD.
```
| 2,823 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS lcl_app IMPLEMENTATION.
METHOD main.
DATA(app) = NEW lcl_app( ).
app->main_2( ).
ENDMETHOD.
METHOD main_2.
DATA shrinker TYPE REF TO zcl_shrinker.
DATA(include_does_not_exist) = CONV string( 'Include &1 does not exist. Create it manually as empty.'(001) ).
SELECT SINGLE * FROM trdir WHERE name = @p_def INTO @DATA(trdir_def).
IF sy-subrc <> 0.
RAISE EXCEPTION TYPE zcx_shrinker EXPORTING text = include_does_not_exist msgv1 = p_def.
ENDIF.
SELECT SINGLE * FROM trdir WHERE name = @p_imp INTO @DATA(trdir_imp).
IF sy-subrc <> 0.
RAISE EXCEPTION TYPE zcx_shrinker EXPORTING text = include_does_not_exist msgv1 = p_def.
ENDIF.
"**********************************************************************
"* Copy database tables
"**********************************************************************
objects_to_copy = VALUE #(
( object = 'TABL' source_obj_name = 'ZSHRINKER_GTT_EC' target_obj_name = p_tab_ec )
( object = 'TABL' source_obj_name = 'ZSHRINKER_GTT_IN' target_obj_name = p_tab_in )
( object = 'TABL' source_obj_name = 'ZSHRINKER_GTT_MP' target_obj_name = p_tab_mp ) ).
shrinker = zcl_shrinker=>create( ).
shrinker->copy_objects(
EXPORTING
source_package = p_frdevc
target_package = p_todevc
user_exit = me
objects = objects_to_copy ).
"**********************************************************************
"* Classes and interfaces all together in DEF and IMP includes
"**********************************************************************
shrinker = zcl_shrinker=>create( ).
DATA(abap_code) = shrinker->get_one_abap_code(
package_range = VALUE #( ( sign = 'I' option = 'EQ' low = p_frdevc ) )
range_of_obj_type = VALUE #( sign = 'I' option = 'EQ' ( low = 'CLAS' ) ( low = 'INTF' ) ( low = 'PROG' ) )
global_replacements = VALUE #( ( posix_regex = '\<Z(.._SHRINKER\w*)' with = 'L$1' start_of_abap_word = abap_true member_interface_prefix = abap_true )
( LINES OF VALUE #( FOR <object_to_copy> IN objects_to_copy
( posix_regex = <object_to_copy>-source_obj_name with = <object_to_copy>-target_obj_name ) ) ) ) ).
DATA(header_lines) = VALUE string_table(
( `********************************************************************************` )
( `* ` )
( `* LICENSE and NOTICE ` )
( `* ` )
( |* See include program { p_licens WIDTH = 30 } | )
( `* ` )
( `********************************************************************************` ) ).
INSERT LINES OF header_lines
INTO abap_code-def_abap_source_code
INDEX 1.
INSERT LINES OF header_lines
INTO abap_code-imp_abap_source_code
INDEX 1.
DATA(syntax_check) = shrinker->syntax_check( VALUE #(
( `REPORT.` )
( LINES OF abap_code-def_abap_source_code )
( LINES OF abap_code-imp_abap_source_code ) ) ).
IF syntax_check-mess IS NOT INITIAL.
RAISE EXCEPTION TYPE zcx_shrinker EXPORTING text = 'Syntax error &1'(001) msgv1 = syntax_check-mess.
ENDIF.
INSERT REPORT p_def FROM abap_code-def_abap_source_code DIRECTORY ENTRY trdir_def.
INSERT REPORT p_imp FROM abap_code-imp_abap_source_code DIRECTORY ENTRY trdir_imp.
COMMIT WORK.
ENDMETHOD.
METHOD zif_shrinker_user_exit_abapgit~is_to_be_deserialized.
IF line_exists( objects_to_copy[ object = object
target_obj_name = obj_name ] ).
result = abap_true.
ENDIF.
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
INSERT REPORT p_def FROM abap_code-def_abap_source_code DIRECTORY ENTRY trdir_def.
```
Explanation: Potential dangerous statement INSERT REPORT.
Suggested fix:
```abap
CLASS lcl_app IMPLEMENTATION.
METHOD main.
DATA(app) = NEW lcl_app( ).
app->main_2( ).
ENDMETHOD.
METHOD main_2.
header_lines = VALUE #(
( `********************************************************************************` )
( `* ` )
( `* LICENSE and NOTICE ` )
( `* ` )
( |* See include program { p_licens WIDTH = 30 } | )
( `* ` )
( `********************************************************************************` ) ).
IF p_tab_ec IS NOT INITIAL.
INSERT VALUE #( object = 'TABL' source_obj_name = 'ZSHRINKER_GTT_EC' target_obj_name = p_tab_ec )
INTO TABLE objects_to_copy.
ENDIF.
IF p_tab_in IS NOT INITIAL.
INSERT VALUE #( object = 'TABL' source_obj_name = 'ZSHRINKER_GTT_IN' target_obj_name = p_tab_in )
INTO TABLE objects_to_copy.
ENDIF.
IF p_tab_mp IS NOT INITIAL.
INSERT VALUE #( object = 'TABL' source_obj_name = 'ZSHRINKER_GTT_MP' target_obj_name = p_tab_mp )
INTO TABLE objects_to_copy.
ENDIF.
IF p_cl_dci IS NOT INITIAL.
INSERT VALUE #( object = 'CLAS' source_obj_name = 'ZCL_SHRINKER_DDIC_CLASS_INTERF' target_obj_name = p_cl_dci )
INTO TABLE objects_to_copy.
ENDIF.
IF p_cl_ap IS NOT INITIAL.
INSERT VALUE #( object = 'CLAS' source_obj_name = 'ZCL_SHRINKER_ANY_PROGRAM' target_obj_name = p_cl_ap )
INTO TABLE objects_to_copy.
ENDIF.
IF p_cl_as IS NOT INITIAL.
INSERT VALUE #( object = 'CLAS' source_obj_name = 'ZCL_SHRINKER_ABAP_SCAN' target_obj_name = p_cl_as )
INTO TABLE objects_to_copy.
ENDIF.
IF p_cl_uti IS NOT INITIAL.
INSERT VALUE #( object = 'CLAS' source_obj_name = 'ZCL_SHRINKER_UTILS' target_obj_name = p_cl_uti )
INTO TABLE objects_to_copy.
ENDIF.
IF p_cx IS NOT INITIAL.
INSERT VALUE #( object = 'CLAS' source_obj_name = 'ZCX_SHRINKER' target_obj_name = p_cx )
INTO TABLE objects_to_copy.
ENDIF.
IF p_if_aca IS NOT INITIAL.
INSERT VALUE #( object = 'INTF' source_obj_name = 'ZIF_SHRINKER_ABAP_CODE_ADAPTER' target_obj_name = p_if_aca )
INTO TABLE objects_to_copy.
ENDIF.
IF p_if_uea IS NOT INITIAL.
INSERT VALUE #( object = 'INTF' source_obj_name = 'ZIF_SHRINKER_USER_EXIT_ABAPGIT' target_obj_name = p_if_uea )
INTO TABLE objects_to_copy.
ENDIF.
DATA(shrinker_copy_objects) = zcl_shrinker_copy_objects=>create( me ).
shrinker_copy_objects->run(
source_package = p_frdevc
target_package = p_todevc
user_exit = me
objects = objects_to_copy ).
ENDMETHOD.
METHOD zif_shrinker_abap_code_adapter~adapt_source_code.
LOOP AT other_source_units REFERENCE INTO DATA(source_unit).
INSERT LINES OF header_lines INTO source_unit->abap_source_code INDEX 1.
ENDLOOP.
ENDMETHOD.
METHOD zif_shrinker_abap_code_adapter~adapt_source_code_before_rep_i.
ENDMETHOD.
METHOD zif_shrinker_user_exit_abapgit~is_to_be_deserialized.
IF line_exists( objects_to_copy[ object = object
target_obj_name = obj_name ] ).
result = abap_true.
ENDIF.
ENDMETHOD.
ENDCLASS.
```
| 2,824 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS zcl_zabap_table_edit_tab_data IMPLEMENTATION.
METHOD constructor.
config = configuration.
table-fields = NEW #( table_name = config-table_name ). "TODO as interface
table-locker = NEW #( table_name = config-table_name ). "TODO as interface
table-comparator = NEW #( table_name = config-table_name ). "TODO as interface
"---TEXT TABLE---
table-text_table = zcl_zabap_table_edit_factory=>get_text_table( CORRESPONDING #( me->config ) ).
table-text_table->append_additional_fields( CHANGING additional_fields = table-additional_fields ).
* "---MAINTANANCE VIEW---
* setup_maintenance_view( ).
setup_grid( ).
"---EXTENSION CALL---
config-ext-data->additional_fields( CHANGING additional_fields = table-additional_fields ).
prepare_initial_data( ).
table-db = zcl_zabap_table_edit_factory=>get_db( ).
ENDMETHOD.
METHOD setup_grid.
grid = NEW cl_gui_alv_grid( zcl_zabap_screen_with_containe=>get_container( ) ).
grid->register_edit_event( cl_gui_alv_grid=>mc_evt_modified ). "Allows to catch edit events
grid->register_edit_event( cl_gui_alv_grid=>mc_evt_enter ). "Allows also to catch Enter
SET HANDLER on_data_changed FOR grid.
SET HANDLER config-ext-data->on_data_changed FOR grid.
SET HANDLER config-ext-data->on_data_changed_finished FOR grid.
"---EXTENSION CALL---
config-ext-config->grid_setup( CHANGING grid = grid ).
ENDMETHOD.
METHOD setup_maintenance_view.
"TODO
* text_table = NEW zcl_zabap_table_edit_text_tab( original_table = table_name change_doc_type = change_doc_type ).
* text_table->append_additional_fields( CHANGING additional_fields = additional_fields ).
ENDMETHOD.
METHOD prepare_initial_data.
"TODO maint view?
CREATE DATA table-initial_data TYPE TABLE OF (config-table_name).
assign_to_table_fs table-initial_data->* <initial_data>.
table-fields->get_table_with_add_fields( EXPORTING additional_fields = table-additional_fields IMPORTING table = DATA(table_descr) ).
CREATE DATA table-modified_data_ext TYPE HANDLE table_descr.
DATA(execute_default_select) = abap_true.
"---EXTENSION CALL---
config-ext-data->default_select( CHANGING execute = execute_default_select ).
IF execute_default_select = abap_true.
SELECT * FROM (config-table_name) INTO TABLE @<initial_data> ORDER BY PRIMARY KEY.
"TODO maintenance view
ENDIF.
"---EXTENSION CALL---
config-ext-data->initial_data( CHANGING initial_data = table-initial_data ).
ENDMETHOD.
METHOD lock_table.
IF table-locker->lock_table( IMPORTING error_message = error_message ) = abap_false.
RETURN.
ENDIF.
"---TEXT TABLE---
IF table-text_table->lock_table( IMPORTING error_message = error_message ) = abap_false.
table-locker->unlock_table( ).
RETURN.
ENDIF.
locked = abap_true.
ENDMETHOD.
METHOD unlock_table.
table-locker->unlock_table( ).
table-text_table->unlock_table( ).
ENDMETHOD.
METHOD reset_grid.
was_data_changed = abap_false.
"You have declare <fs> type table, and assign dynamic table, because you can't just use corresponding with table-initial_data->* :(
assign_to_table_fs table-initial_data->* <initial_data>.
assign_to_table_fs table-modified_data_ext->* <modified_data_ext>.
<modified_data_ext> = CORRESPONDING #( <initial_data> ).
"---TEXT TABLE---
table-text_table->update_text_elements( CHANGING extended = table-modified_data_ext ).
table-fields->set_edit_mode( in_edit_mode ).
DATA(fc) = table-fields->get_fc_with_add_fields( table-additional_fields ).
"---EXTENSION CALL---
config-ext-data->refresh_grid( EXPORTING in_edit_mode = in_edit_mode
CHANGING field_catalogue = fc initial_data = table-initial_data modified_data_ext = table-modified_data_ext ).
DATA(field_cat) = CORRESPONDING lvc_t_fcat( fc ).
grid->set_table_for_first_display( EXPORTING is_variant = VALUE #( report = config-table_name handle = 'BASE' username = sy-uname )
is_layout = VALUE #( sel_mode = 'A' ) i_save = 'A'
CHANGING it_outtab = <modified_data_ext> it_fieldcatalog = field_cat ).
ENDMETHOD.
METHOD validate.
grid->check_changed_data( IMPORTING e_valid = DATA(valid) ).
IF valid = abap_false.
result = zcl_zabap_table_edit_globals=>c_validation-incorrect_values.
RETURN.
ENDIF.
table-comparator->update_mandant( table-modified_data_ext ).
DATA(modified_data) = get_modified_data_no_ext( ).
table-comparator->compare_tables( EXPORTING initial_data = table-initial_data modified_data = modified_data
IMPORTING duplicates = compared-duplicates inserted = compared-inserted deleted = compared-deleted
before_modified = compared-before_modified modified = compared-modified ).
assign_to_table_fs compared-duplicates->* <duplicates>.
IF lines( <duplicates> ) > 0.
result = zcl_zabap_table_edit_globals=>c_validation-duplicates.
RETURN.
ENDIF.
result = zcl_zabap_table_edit_globals=>c_validation-ok.
"---EXTENSION CALL---
config-ext-data->additional_validation( CHANGING result = result all_modified_data = modified_data compared = compared ).
ENDMETHOD.
METHOD save_data.
TRY.
"---EXTENSION CALL---
config-ext-data->before_save( CHANGING compared = compared ).
assign_to_table_fs compared-modified->* <modified>.
assign_to_table_fs compared-inserted->* <inserted>.
assign_to_table_fs compared-deleted->* <deleted>.
"Actual db changes
table-db->delete_data( table = config-table_name table_data = <deleted> ).
IF table-fields->key_fields_only = abap_true.
"^Can't use modify if all fields are key fields. Also in this case it's impossible to have modified entries.
table-db->insert_data( table = config-table_name table_data = <inserted> ).
ELSE.
table-db->modify_data( table = config-table_name table_data = <modified> ).
table-db->modify_data( table = config-table_name table_data = <inserted> ).
ENDIF.
"Change doc creation
IF config-change_doc_type <> space.
create_change_doc( compared ).
ENDIF.
"---TEXT TABLE---
table-text_table->save( initial = table-initial_data extended = table-modified_data_ext ).
"Commmit all and check for errors
COMMIT WORK AND WAIT.
IF sy-subrc <> 0.
RAISE EXCEPTION TYPE zcx_zabap_table_edit EXPORTING custom_message = |SAP LUW commit returned { sy-subrc }|.
ENDIF.
"---EXTENSION CALL---
config-ext-data->after_save( CHANGING compared = compared ).
prepare_initial_data( ).
sucess = abap_true.
CATCH zcx_zabap_table_edit INTO DATA(zcx).
sucess = abap_false.
ROLLBACK WORK.
erorr_message = zcx->get_text( ).
ENDTRY.
ENDMETHOD.
METHOD create_change_doc.
DATA(cd) = ZCL_ZABAP_TABLE_EDIT_FACTORY=>get_change_doc( objectclass = CONV #( config-table_name ) objectid = CONV #( config-table_name ) ).
cd->open( ).
cd->change_multi( force_cd_on_all_fields = COND #( WHEN config-change_doc_type = 'F' THEN abap_true ELSE abap_false )
table_name = config-table_name
deleted = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-deleted indicator = 'D' )
inserted = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-deleted indicator = 'I' )
before_modified = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-deleted indicator = 'U' )
modified = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-deleted ) ).
"Some SAP magic to get initial t-code
DATA: original_tcode TYPE sytcode.
CALL 'GET_PARAM_TCOD' ID 'PTCOD' FIELD original_tcode.
cd->close( tcode = original_tcode ).
ENDMETHOD.
METHOD on_data_changed.
was_data_changed = abap_true.
ENDMETHOD.
METHOD get_modified_data_no_ext.
CREATE DATA modified_data TYPE TABLE OF (config-table_name).
assign_to_table_fs modified_data->* <modified_data>.
assign_to_table_fs table-modified_data_ext->* <modified_data_ext>.
<modified_data> = CORRESPONDING #( <modified_data_ext> ).
ENDMETHOD.
METHOD get_selected_row_index.
grid->get_selected_rows( IMPORTING et_index_rows = DATA(selected_rows) ).
IF lines( selected_rows ) = 1.
index = selected_rows[ 1 ]-index.
RETURN.
ENDIF.
grid->get_selected_cells( IMPORTING et_cell = DATA(selected_cells) ).
IF lines( selected_cells ) = 1.
index = selected_cells[ 1 ]-row_id.
RETURN.
ENDIF.
ENDMETHOD.
METHOD get_selected_row_key.
DATA(selected) = get_selected_row_index( ).
IF selected = 0.
RETURN.
ENDIF.
"Build and fill tabkey of selected record
assign_to_table_fs table-modified_data_ext->* <modified_data_ext>.
"Create key struct to cast to cdtabkey - needed to extract just key fields
table-fields->get_keys_structure( EXPORTING include_index_field = abap_false IMPORTING struct = DATA(key_struct) ).
DATA key_line TYPE REF TO data.
CREATE DATA key_line TYPE HANDLE key_struct.
FIELD-SYMBOLS <key_line> TYPE any.
ASSIGN key_line->* TO <key_line>.
"TODO check with decimals
<key_line> = CORRESPONDING #( <modified_data_ext>[ selected ] ).
tabkey = <key_line>.
* DATA cdtabkeylo TYPE cdtabkeylo.
* cdtabkeylo = <key_line>.
* "Can't assign directly to string
* tabkey = cdtabkeylo.
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
CALL 'GET_PARAM_TCOD' ID 'PTCOD' FIELD original_tcode.
```
Explanation: Potential dangerous statement KERNEL CALL.
Suggested fix:
```abap
CLASS zcl_zabap_table_edit_tab_data IMPLEMENTATION.
METHOD constructor.
config = configuration.
table-fields = NEW #( table_name = config-table_name ).
table-locker = NEW #( table_name = config-table_name ).
table-comparator = NEW #( table_name = config-table_name ).
table-text_table = zcl_zabap_table_edit_factory=>get_text_table( CORRESPONDING #( me->config ) ).
table-text_table->append_additional_fields( CHANGING additional_fields = table-additional_fields ).
me->grid = grid.
setup_grid( ).
config-ext-data->additional_fields( CHANGING additional_fields = table-additional_fields ).
prepare_initial_data( ).
table-db = zcl_zabap_table_edit_factory=>get_db( ).
ENDMETHOD.
METHOD create_change_doc.
DATA(cd) = zcl_zabap_table_edit_factory=>get_change_doc( objectclass = CONV #( config-table_name ) objectid = CONV #( config-table_name ) ).
cd->open( ).
cd->change_multi( force_cd_on_all_fields = COND #( WHEN config-change_doc_type = 'F' THEN abap_true ELSE abap_false )
table_name = config-table_name
deleted = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-deleted indicator = 'D' )
inserted = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-inserted indicator = 'I' )
before_modified = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-before_modified indicator = 'U' )
modified = cd->create_table_with_indicator( table_name = config-table_name original_table = compared-modified ) ).
DATA: original_tcode TYPE sytcode.
CALL 'GET_PARAM_TCOD' ID 'PTCOD' FIELD original_tcode.
cd->close( tcode = original_tcode ).
ENDMETHOD.
METHOD get_modified_data_no_ext.
CREATE DATA modified_data TYPE TABLE OF (config-table_name).
assign_to_table_fs modified_data->* <modified_data>.
assign_to_table_fs table-modified_data_ext->* <modified_data_ext>.
<modified_data> = CORRESPONDING #( <modified_data_ext> ).
ENDMETHOD.
METHOD get_selected_row_index.
grid->get_selected_rows( IMPORTING et_index_rows = DATA(selected_rows) ).
IF lines( selected_rows ) = 1.
index = selected_rows[ 1 ]-index.
RETURN.
ENDIF.
grid->get_selected_cells( IMPORTING et_cell = DATA(selected_cells) ).
IF lines( selected_cells ) = 1.
index = selected_cells[ 1 ]-row_id.
RETURN.
ENDIF.
ENDMETHOD.
METHOD on_data_changed.
was_data_changed = abap_true.
ENDMETHOD.
METHOD prepare_initial_data.
CREATE DATA table-initial_data TYPE TABLE OF (config-table_name).
assign_to_table_fs table-initial_data->* <initial_data>.
table-fields->get_base_with_add_fields( EXPORTING additional_fields = table-additional_fields IMPORTING table = DATA(table_descr) ).
CREATE DATA table-modified_data_ext TYPE HANDLE table_descr.
DATA(execute_default_select) = abap_true.
config-ext-data->default_select( CHANGING execute = execute_default_select ).
IF execute_default_select = abap_true.
SELECT * FROM (config-table_name) INTO TABLE @<initial_data> ORDER BY PRIMARY KEY.
ENDIF.
config-ext-data->initial_data( CHANGING initial_data = table-initial_data ).
ENDMETHOD.
METHOD setup_grid.
grid->register_edit_event( cl_gui_alv_grid=>mc_evt_modified ).
grid->register_edit_event( cl_gui_alv_grid=>mc_evt_enter ).
SET HANDLER on_data_changed FOR grid.
SET HANDLER config-ext-data->on_data_changed FOR grid.
SET HANDLER config-ext-data->on_data_changed_finished FOR grid.
config-ext-config->grid_setup( CHANGING grid = grid ).
ENDMETHOD.
METHOD zif_zabap_table_edit_tab_data~get_selected_row_key.
DATA(selected) = get_selected_row_index( ).
IF selected = 0.
RETURN.
ENDIF.
assign_to_table_fs table-modified_data_ext->* <modified_data_ext>.
table-fields->get_keys_structure( EXPORTING include_index_field = abap_false IMPORTING struct = DATA(key_struct) ).
DATA key_line TYPE REF TO data.
CREATE DATA key_line TYPE HANDLE key_struct.
FIELD-SYMBOLS <key_line> TYPE any.
ASSIGN key_line->* TO <key_line>.
<key_line> = CORRESPONDING #( <modified_data_ext>[ selected ] ).
tabkey = <key_line>.
ENDMETHOD.
METHOD zif_zabap_table_edit_tab_data~lock_table.
IF table-locker->lock_table( IMPORTING error_message = error_message ) = abap_false.
RETURN.
ENDIF.
IF table-text_table->lock_table( IMPORTING error_message = error_message ) = abap_false.
table-locker->unlock_table( ).
RETURN.
ENDIF.
locked = abap_true.
ENDMETHOD.
METHOD zif_zabap_table_edit_tab_data~reset_grid.
was_data_changed = abap_false.
assign_to_table_fs table-initial_data->* <initial_data>.
assign_to_table_fs table-modified_data_ext->* <modified_data_ext>.
<modified_data_ext> = CORRESPONDING #( <initial_data> ).
table-text_table->update_text_elements( CHANGING extended = table-modified_data_ext ).
table-fields->set_edit_mode( in_edit_mode ).
DATA(fc) = table-fields->get_fc_with_add_fields( table-additional_fields ).
config-ext-data->refresh_grid( EXPORTING in_edit_mode = in_edit_mode
CHANGING field_catalogue = fc initial_data = table-initial_data modified_data_ext = table-modified_data_ext ).
DATA(field_cat) = CORRESPONDING lvc_t_fcat( fc ).
grid->set_table_for_first_display( EXPORTING is_variant = VALUE #( report = config-table_name handle = 'BASE' username = sy-uname )
is_layout = VALUE #( sel_mode = 'A' ) i_save = 'A'
CHANGING it_outtab = <modified_data_ext> it_fieldcatalog = field_cat ).
ENDMETHOD.
METHOD zif_zabap_table_edit_tab_data~save_data.
TRY.
config-ext-data->before_save( CHANGING compared = compared ).
assign_to_table_fs compared-modified->* <modified>.
assign_to_table_fs compared-inserted->* <inserted>.
assign_to_table_fs compared-deleted->* <deleted>.
table-db->delete_data( table = config-table_name table_data = <deleted> ).
IF table-fields->key_fields_only = abap_true.
table-db->insert_data( table = config-table_name table_data = <inserted> ).
ELSE.
table-db->modify_data( table = config-table_name table_data = <modified> ).
table-db->modify_data( table = config-table_name table_data = <inserted> ).
ENDIF.
IF config-change_doc_type <> space.
create_change_doc( compared ).
ENDIF.
table-text_table->save( initial = table-initial_data extended = table-modified_data_ext ).
COMMIT WORK AND WAIT.
IF sy-subrc <> 0.
MESSAGE e014(zabap_table_edit) WITH sy-subrc INTO DATA(msg).
RAISE EXCEPTION TYPE zcx_zabap_table_edit EXPORTING custom_message = msg.
ENDIF.
config-ext-data->after_save( CHANGING compared = compared ).
prepare_initial_data( ).
sucess = abap_true.
CATCH zcx_zabap_table_edit INTO DATA(zcx).
sucess = abap_false.
ROLLBACK WORK.
erorr_message = zcx->get_text( ).
ENDTRY.
ENDMETHOD.
METHOD zif_zabap_table_edit_tab_data~unlock_table.
table-locker->unlock_table( ).
table-text_table->unlock_table( ).
ENDMETHOD.
METHOD zif_zabap_table_edit_tab_data~validate.
grid->check_changed_data( IMPORTING e_valid = DATA(valid) ).
IF valid = abap_false.
result = zcl_zabap_table_edit_globals=>c_validation-incorrect_values.
RETURN.
ENDIF.
table-comparator->update_mandant( table-modified_data_ext ).
DATA(modified_data) = get_modified_data_no_ext( ).
table-comparator->compare_tables( EXPORTING initial_data = table-initial_data modified_data = modified_data
IMPORTING duplicates = compared-duplicates inserted = compared-inserted deleted = compared-deleted
before_modified = compared-before_modified modified = compared-modified ).
assign_to_table_fs compared-duplicates->* <duplicates>.
IF lines( <duplicates> ) > 0.
result = zcl_zabap_table_edit_globals=>c_validation-duplicates.
RETURN.
ENDIF.
result = zcl_zabap_table_edit_globals=>c_validation-ok.
config-ext-data->additional_validation( CHANGING result = result all_modified_data = modified_data compared = compared ).
ENDMETHOD.
ENDCLASS.
```
| 2,825 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS zcl_translatable_program IMPLEMENTATION.
METHOD constructor.
program_name = program.
ENDMETHOD.
METHOD zif_translatable~read_language.
DATA textpool TYPE STANDARD TABLE OF textpool WITH EMPTY KEY.
READ TEXTPOOL program_name INTO textpool LANGUAGE sap_lang.
LOOP AT textpool REFERENCE INTO DATA(textpool_text).
DATA(program_text) = get_text( get_text_id( id = textpool_text->id key = textpool_text->key ) ).
modify_translation( EXPORTING sap_lang = sap_lang content = textpool_text->entry CHANGING translations = program_text->translations ).
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~get_all_texts.
texts = me->texts.
ENDMETHOD.
METHOD get_text_id.
text_id = |{ id }\|{ key }|.
ENDMETHOD.
METHOD parse_text_id.
SPLIT text_id AT '|' INTO id key.
ENDMETHOD.
METHOD zif_translatable~modify_texts.
LOOP AT new_texts REFERENCE INTO DATA(new_text).
DATA(program_text) = get_text( new_text->text_id ).
LOOP AT new_text->translations REFERENCE INTO DATA(new_translation).
modify_translation( EXPORTING sap_lang = new_translation->sap_lang content = new_translation->content
CHANGING translations = program_text->translations ).
ENDLOOP.
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~save_modified_texts.
DATA textpool TYPE STANDARD TABLE OF textpool WITH EMPTY KEY.
LOOP AT texts REFERENCE INTO DATA(text).
parse_text_id( EXPORTING text_id = text->text_id IMPORTING id = DATA(id) key = DATA(key) ).
LOOP AT text->translations REFERENCE INTO DATA(translation) WHERE sap_lang = sap_lang.
APPEND VALUE #( id = id key = key entry = translation->content ) TO textpool.
ENDLOOP.
ENDLOOP.
INSERT TEXTPOOL program_name FROM textpool LANGUAGE sap_lang.
ENDMETHOD.
METHOD get_text.
text = REF #( texts[ KEY id_only text_id = text_id ] OPTIONAL ).
IF NOT text IS BOUND.
INSERT VALUE #( object_type = c_kind object_name = program_name text_id = text_id ) INTO TABLE texts REFERENCE INTO text.
ENDIF.
ENDMETHOD.
METHOD modify_translation.
DATA(translation) = REF #( translations[ sap_lang = sap_lang ] OPTIONAL ).
IF NOT translation IS BOUND.
INSERT VALUE #( sap_lang = sap_lang ) INTO TABLE translations REFERENCE INTO translation.
ENDIF.
translation->content = content.
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
INSERT TEXTPOOL program_name FROM textpool LANGUAGE sap_lang.
```
Explanation: Potential dangerous statement INSERT TEXTPOOL.
Suggested fix:
```abap
CLASS zcl_translatable_program IMPLEMENTATION.
METHOD constructor.
zif_translatable~object_name = program.
zif_translatable~object_type = zcl_translation_globals=>c_object_type-program.
textpool = zcl_translation_factory=>create_translatable_sub( object_name = program
subcomponent = zcl_translation_globals=>c_subcomponent-textpool ).
ENDMETHOD.
METHOD zif_translatable~read_language.
textpool->zif_translatable~read_language( sap_lang ).
ENDMETHOD.
METHOD zif_translatable~get_all_texts.
APPEND LINES OF textpool->zif_translatable~get_all_texts( ) TO texts.
ENDMETHOD.
METHOD get_text_sub_type.
SPLIT text_id AT '|' INTO sub_type DATA(dummy).
ENDMETHOD.
METHOD zif_translatable~modify_texts.
LOOP AT new_texts REFERENCE INTO DATA(new_text).
CASE get_text_sub_type( new_text->text_id ).
WHEN textpool->sub_type.
textpool->modify_text( new_text->* ).
WHEN OTHERS.
ENDCASE.
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~save_modified_texts.
textpool->zif_translatable~save_modified_texts( sap_lang ).
ENDMETHOD.
ENDCLASS.
```
| 2,826 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
CLASS zcl_translatable_menu_el IMPLEMENTATION.
METHOD constructor.
zif_translatable~object_name = program.
zif_translatable~object_type = zcl_translation_globals=>c_object_type-program.
sub_type = zcl_translation_globals=>c_subcomponent-menu_texts.
ENDMETHOD.
METHOD zif_translatable~read_language.
SELECT obj_type, obj_code, sub_code, texttype, text FROM rsmptexts
WHERE progname = @zif_translatable~object_name AND sprsl = @sap_lang
INTO TABLE @DATA(menu_texts).
LOOP AT menu_texts REFERENCE INTO DATA(menu_text).
DATA(program_text) = get_text( get_text_id( obj_type = menu_text->obj_type obj_code = menu_text->obj_code
sub_code = menu_text->sub_code texttype = menu_text->texttype ) ).
modify_translation( EXPORTING sap_lang = sap_lang content = CONV #( menu_text->text ) CHANGING translations = program_text->translations ).
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~get_all_texts.
texts = me->texts.
ENDMETHOD.
METHOD get_text_id.
text_id = |{ sub_type }\|{ obj_type }\|{ obj_code }\|{ sub_code }\|{ texttype }|.
ENDMETHOD.
METHOD parse_text_id.
SPLIT text_id AT '|' INTO sub_type obj_type obj_code sub_code texttype.
ENDMETHOD.
METHOD zif_translatable~modify_texts.
LOOP AT new_texts REFERENCE INTO DATA(new_text) USING KEY text_id
WHERE object_type = zif_translatable~object_type AND object_name = zif_translatable~object_name.
parse_text_id( EXPORTING text_id = new_text->text_id IMPORTING sub_type = DATA(text_sub_type) ).
IF text_sub_type <> sub_type.
CONTINUE.
ENDIF.
DATA(program_text) = get_text( new_text->text_id ).
LOOP AT new_text->translations REFERENCE INTO DATA(new_translation).
modify_translation( EXPORTING sap_lang = new_translation->sap_lang content = new_translation->content
CHANGING translations = program_text->translations ).
ENDLOOP.
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~save_modified_texts.
DATA rsmptexts_table TYPE STANDARD TABLE OF rsmptexts WITH EMPTY KEY.
DATA(lxe_type_texts) = abap_false.
DATA(lxe_type_tech) = abap_false.
LOOP AT texts REFERENCE INTO DATA(text).
parse_text_id( EXPORTING text_id = text->text_id IMPORTING obj_type = DATA(obj_type) obj_code = DATA(obj_code)
sub_code = DATA(sub_code) texttype = DATA(texttype) ).
LOOP AT text->translations REFERENCE INTO DATA(translation) WHERE sap_lang = sap_lang.
APPEND VALUE #( progname = zif_translatable~object_name sprsl = sap_lang obj_type = obj_type obj_code = obj_code
sub_code = sub_code texttype = texttype text = CONV #( translation->content ) ) TO rsmptexts_table.
ENDLOOP.
"Got this logic from ST05 trace when translating menu elements
lxe_type_tech = xsdbool( ( obj_type <> 'T' AND texttype = 'T' ) OR lxe_type_tech = abap_true ).
lxe_type_texts = xsdbool( ( obj_type = 'T' OR texttype <> 'T' ) OR lxe_type_texts = abap_true ).
ENDLOOP.
MODIFY rsmptexts FROM TABLE @rsmptexts_table.
update_lxe_log( sap_lang = sap_lang lxe_type_texts = lxe_type_texts lxe_type_tech = lxe_type_tech ).
ENDMETHOD.
METHOD get_text.
text = REF #( texts[ KEY id_only text_id = text_id ] OPTIONAL ).
IF NOT text IS BOUND.
INSERT VALUE #( object_type = zif_translatable~object_type object_name = zif_translatable~object_name
text_id = text_id ) INTO TABLE texts REFERENCE INTO text.
ENDIF.
ENDMETHOD.
METHOD modify_translation.
DATA(translation) = REF #( translations[ sap_lang = sap_lang ] OPTIONAL ).
IF NOT translation IS BOUND.
INSERT VALUE #( sap_lang = sap_lang ) INTO TABLE translations REFERENCE INTO translation.
ENDIF.
translation->content = content.
ENDMETHOD.
METHOD update_lxe_log.
DATA lxe_log_table TYPE STANDARD TABLE OF lxe_log WITH EMPTY KEY.
SELECT SINGLE custmnr FROM lxe_custmnr INTO @DATA(custmnr).
GET TIME.
IF lxe_type_texts = abap_true.
APPEND VALUE #( custmnr = custmnr objname = zif_translatable~object_name objtype = c_lxe_type-texts targlng = sap_lang
uname = sy-uname udate = sy-datum utime = sy-uzeit ) TO lxe_log_table.
ENDIF.
IF lxe_type_tech = abap_true.
APPEND VALUE #( custmnr = custmnr objname = zif_translatable~object_name objtype = c_lxe_type-tech targlng = sap_lang
uname = sy-uname udate = sy-datum utime = sy-uzeit ) TO lxe_log_table.
ENDIF.
MODIFY lxe_log FROM TABLE @lxe_log_table.
ENDMETHOD.
ENDCLASS.
```
|
I found vulnerabilities in the line:
```abap
MODIFY lxe_log FROM TABLE @lxe_log_table.
```
Explanation: Modify only own DB tables.
Suggested fix:
```abap
CLASS ZCL_TRANSLATABLE_MENU_EL IMPLEMENTATION.
METHOD constructor.
zif_translatable~object_name = program.
zif_translatable~object_type = zcl_translation_globals=>c_object_type-program.
sub_type = zcl_translation_globals=>c_subcomponent-menu_texts.
ENDMETHOD.
METHOD get_text.
text = REF #( texts[ KEY id_only text_id = text_id ] OPTIONAL ).
IF NOT text IS BOUND.
INSERT VALUE #( object_type = zif_translatable~object_type object_name = zif_translatable~object_name
text_id = text_id ) INTO TABLE texts REFERENCE INTO text.
ENDIF.
ENDMETHOD.
METHOD get_text_id.
text_id = |{ sub_type }\|{ parsed-obj_type }\|{ parsed-obj_code }\|{ parsed-sub_code }\|{ parsed-texttype }|.
ENDMETHOD.
METHOD modify_translation.
DATA(translation) = REF #( translations[ sap_lang = sap_lang ] OPTIONAL ).
IF NOT translation IS BOUND.
INSERT VALUE #( sap_lang = sap_lang ) INTO TABLE translations REFERENCE INTO translation.
ENDIF.
translation->content = content.
ENDMETHOD.
METHOD parse_text_id.
SPLIT text_id AT '|' INTO parsed-sub_type parsed-obj_type parsed-obj_code parsed-sub_code parsed-texttype.
ENDMETHOD.
METHOD zif_translatable~get_all_texts.
texts = me->texts.
ENDMETHOD.
METHOD zif_translatable~modify_texts.
LOOP AT new_texts REFERENCE INTO DATA(new_text) USING KEY text_id
WHERE object_type = zif_translatable~object_type AND object_name = zif_translatable~object_name.
DATA(parsed) = parse_text_id( new_text->text_id ).
IF parsed-sub_type <> sub_type.
CONTINUE.
ENDIF.
DATA(program_text) = get_text( new_text->text_id ).
LOOP AT new_text->translations REFERENCE INTO DATA(new_translation).
modify_translation( EXPORTING sap_lang = new_translation->sap_lang content = new_translation->content
CHANGING translations = program_text->translations ).
ENDLOOP.
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~read_language.
SELECT obj_type, obj_code, sub_code, texttype, text FROM rsmptexts
WHERE progname = @zif_translatable~object_name AND sprsl = @sap_lang
INTO TABLE @DATA(menu_texts).
LOOP AT menu_texts REFERENCE INTO DATA(menu_text).
DATA(program_text) = get_text( get_text_id( VALUE #( sub_type = sub_type obj_type = menu_text->obj_type obj_code = menu_text->obj_code
sub_code = menu_text->sub_code texttype = menu_text->texttype ) ) ).
modify_translation( EXPORTING sap_lang = sap_lang content = CONV #( menu_text->text ) CHANGING translations = program_text->translations ).
ENDLOOP.
ENDMETHOD.
METHOD zif_translatable~save_modified_texts.
DATA(lxe_log) = zcl_translation_factory=>get_lxe_log( ).
DATA lxe_log_table TYPE lxe_log->tt_lxe_log.
DATA rsmptexts_table TYPE STANDARD TABLE OF rsmptexts WITH EMPTY KEY.
LOOP AT texts REFERENCE INTO DATA(text).
DATA(parsed) = parse_text_id( text->text_id ).
LOOP AT text->translations REFERENCE INTO DATA(translation) WHERE sap_lang = sap_lang.
APPEND VALUE #( progname = zif_translatable~object_name sprsl = sap_lang obj_type = parsed-obj_type obj_code = parsed-obj_code
sub_code = parsed-sub_code texttype = parsed-texttype text = CONV #( translation->content ) ) TO rsmptexts_table.
IF parsed-obj_type <> 'T' AND parsed-texttype = 'T'.
APPEND VALUE #( objname = zif_translatable~object_name objtype = c_lxe_type-tech targlng = sap_lang ) TO lxe_log_table.
ELSE.
APPEND VALUE #( objname = zif_translatable~object_name objtype = c_lxe_type-texts targlng = sap_lang ) TO lxe_log_table.
ENDIF.
ENDLOOP.
ENDLOOP.
MODIFY rsmptexts FROM TABLE @rsmptexts_table.
lxe_log->update_lxe_log( lxe_log_table ).
ENDMETHOD.
ENDCLASS.
```
| 2,827 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
method _EXECUTE_DELETE.
IF iv_where IS NOT INITIAL.
DELETE FROM (iv_table_name)
WHERE (iv_where).
ELSE.
DELETE FROM (iv_table_name).
ENDIF.
rv_subrc = sy-subrc.
endmethod.
```
|
I found vulnerabilities in the line:
```abap
DELETE FROM (iv_table_name)
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
```abap
DELETE FROM (iv_table_name).
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
METHOD _execute_delete.
DATA: lx_exception TYPE REF TO cx_root.
TRY.
IF iv_where IS NOT INITIAL.
DELETE FROM (iv_table_name)
WHERE (iv_where).
ELSE.
DELETE FROM (iv_table_name).
ENDIF.
rv_subrc = sy-subrc.
CATCH cx_root INTO lx_exception.
zcl_zosql_utils=>raise_from_any_exception( lx_exception ).
ENDTRY.
ENDMETHOD.
```
| 2,828 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
METHOD _execute_select.
DATA: lv_order_by_primary_key TYPE abap_bool.
lv_order_by_primary_key = _if_order_by_primary_key( iv_order_by ).
IF iv_new_syntax = abap_true.
" Dynamic call for backward compatibility with older versions
CALL METHOD ('ZCL_ZOSQL_UTILS_740')=>('EXECUTE_SELECT_740')
EXPORTING
iv_select = iv_select
iv_from = iv_from
iv_where = iv_where
iv_group_by = iv_group_by
iv_having = iv_having
iv_order_by = iv_order_by
iv_distinct = iv_distinct
it_for_all_entries_table = it_for_all_entries_table
is_dynamic_struct_with_params = is_dynamic_struct_with_params
iv_do_into_corresponding = iv_do_into_corresponding
iv_number_of_rows_to_select = iv_number_of_rows_to_select
IMPORTING
et_result_table = et_result_table.
RETURN.
ENDIF.
IF it_for_all_entries_table IS NOT INITIAL.
IF iv_order_by IS NOT INITIAL.
MESSAGE e051 INTO zcl_zosql_utils=>dummy.
zcl_zosql_utils=>raise_exception_from_sy_msg( ).
ENDIF.
IF iv_group_by IS NOT INITIAL.
MESSAGE e052 INTO zcl_zosql_utils=>dummy.
zcl_zosql_utils=>raise_exception_from_sy_msg( ).
ENDIF.
IF iv_distinct = abap_true.
IF iv_do_into_corresponding = abap_true.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ELSE.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ENDIF.
ELSE.
IF iv_do_into_corresponding = abap_true.
SELECT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ELSE.
SELECT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ENDIF.
ENDIF.
ELSE.
IF iv_distinct = abap_true.
IF iv_do_into_corresponding = abap_true.
IF lv_order_by_primary_key = abap_true.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ELSE.
IF lv_order_by_primary_key = abap_true.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ENDIF.
ELSE.
IF iv_do_into_corresponding = abap_true.
IF lv_order_by_primary_key = abap_true.
SELECT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ELSE.
IF lv_order_by_primary_key = abap_true.
SELECT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ENDIF.
ENDIF.
ENDIF.
ENDMETHOD.
```
|
I found vulnerabilities in the line:
```abap
IF iv_do_into_corresponding = abap_true.
SELECT DISTINCT (iv_select) * <-- There is a problem here
FROM (iv_from)
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
WHERE (iv_where).
ELSE.
SELECT DISTINCT (iv_select) * <-- There is a problem here
FROM (iv_from)
INTO TABLE et_result_table
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
IF iv_do_into_corresponding = abap_true.
SELECT (iv_select) * <-- There is a problem here
FROM (iv_from)
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
WHERE (iv_where).
ELSE.
SELECT (iv_select) * <-- There is a problem here
FROM (iv_from)
INTO TABLE et_result_table
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
IF lv_order_by_primary_key = abap_true.
SELECT DISTINCT (iv_select) * <-- There is a problem here
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
ORDER BY PRIMARY KEY.
ELSE.
SELECT DISTINCT (iv_select) * <-- There is a problem here
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
ELSE.
IF lv_order_by_primary_key = abap_true.
SELECT DISTINCT (iv_select) * <-- There is a problem here
FROM (iv_from)
INTO TABLE et_result_table
```
Explanation: Potential dangerous statement Dynamic SQL.
```abap
ORDER BY PRIMARY KEY.
ELSE.
SELECT DISTINCT (iv_select) * <-- There is a problem here
FROM (iv_from)
INTO TABLE et_result_table
```
Explanation: Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
METHOD _execute_select.
DATA: lv_order_by_primary_key TYPE abap_bool,
lx_exception TYPE REF TO cx_root.
lv_order_by_primary_key = _if_order_by_primary_key( iv_order_by ).
TRY.
IF iv_new_syntax = abap_true.
CALL METHOD ('ZCL_ZOSQL_UTILS_740')=>('EXECUTE_SELECT_740')
EXPORTING
iv_select = iv_select
iv_from = iv_from
iv_where = iv_where
iv_group_by = iv_group_by
iv_having = iv_having
iv_order_by = iv_order_by
iv_distinct = iv_distinct
it_for_all_entries_table = it_for_all_entries_table
is_dynamic_struct_with_params = is_dynamic_struct_with_params
iv_do_into_corresponding = iv_do_into_corresponding
iv_number_of_rows_to_select = iv_number_of_rows_to_select
IMPORTING
et_result_table = et_result_table.
RETURN.
ENDIF.
IF it_for_all_entries_table IS NOT INITIAL.
IF iv_order_by IS NOT INITIAL.
MESSAGE e051 INTO zcl_zosql_utils=>dummy.
zcl_zosql_utils=>raise_exception_from_sy_msg( ).
ENDIF.
IF iv_group_by IS NOT INITIAL.
MESSAGE e052 INTO zcl_zosql_utils=>dummy.
zcl_zosql_utils=>raise_exception_from_sy_msg( ).
ENDIF.
IF iv_distinct = abap_true.
IF iv_do_into_corresponding = abap_true.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ELSE.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ENDIF.
ELSE.
IF iv_do_into_corresponding = abap_true.
SELECT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ELSE.
SELECT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
FOR ALL ENTRIES IN it_for_all_entries_table
WHERE (iv_where).
ENDIF.
ENDIF.
ELSE.
IF iv_distinct = abap_true.
IF iv_do_into_corresponding = abap_true.
IF lv_order_by_primary_key = abap_true.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ELSE.
IF lv_order_by_primary_key = abap_true.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT DISTINCT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ENDIF.
ELSE.
IF iv_do_into_corresponding = abap_true.
IF lv_order_by_primary_key = abap_true.
SELECT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT (iv_select)
FROM (iv_from)
INTO CORRESPONDING FIELDS OF TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ELSE.
IF lv_order_by_primary_key = abap_true.
SELECT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY PRIMARY KEY.
ELSE.
SELECT (iv_select)
FROM (iv_from)
INTO TABLE et_result_table
UP TO iv_number_of_rows_to_select ROWS
WHERE (iv_where)
GROUP BY (iv_group_by)
HAVING (iv_having)
ORDER BY (iv_order_by).
ENDIF.
ENDIF.
ENDIF.
ENDIF.
CATCH cx_root INTO lx_exception.
zcl_zosql_utils=>raise_from_any_exception( lx_exception ).
ENDTRY.
ENDMETHOD.
```
| 2,829 |
Find vulnerabilities in this ABAP code snippet.
|
```abap
method _EXECUTE_UPDATE.
IF iv_where IS NOT INITIAL.
UPDATE (iv_table_name)
SET (iv_set_statement)
WHERE (iv_where).
ELSE.
UPDATE (iv_table_name)
SET (iv_set_statement).
ENDIF.
rv_subrc = sy-subrc.
endmethod.
```
|
I found vulnerabilities in the line:
```abap
IF iv_where IS NOT INITIAL.
UPDATE (iv_table_name) * <-- There is a problem here
SET (iv_set_statement)
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
```abap
ELSE.
UPDATE (iv_table_name) * <-- There is a problem here
SET (iv_set_statement).
```
Explanation: Modify only own DB tables | Potential dangerous statement Dynamic SQL.
Suggested fix:
```abap
METHOD _execute_update.
DATA: lx_exception TYPE REF TO cx_root.
TRY.
IF iv_where IS NOT INITIAL.
UPDATE (iv_table_name)
SET (iv_set_statement)
WHERE (iv_where).
ELSE.
UPDATE (iv_table_name)
SET (iv_set_statement).
ENDIF.
rv_subrc = sy-subrc.
CATCH cx_root INTO lx_exception.
zcl_zosql_utils=>raise_from_any_exception( lx_exception ).
ENDTRY.
ENDMETHOD.
```
| 2,830 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.