Application Security

4/18/2018
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SAP Security Tool Now Enables Automated QA & Security Checks for SAPUI5

Virtual Forge now offers its CodeProfiler for HANA with support of SAPUI5.

HEIDELBERG, Germany (April 18, 2018) – Virtual Forge, the leading provider of cyber security solutions for SAP®, today announced its CodeProfiler for HANA is now able to scan the SAPUI5 programming language. The company also announced new patents pending for the technology. CodeProfiler for HANA enables companies to run automated quality and security checks on their custom developments as lines of code are being developed on the SAP HANA platform.

SAPUI5 is a modern HTML5-based development toolkit based on JavaScript, CSS and HTML5 that enables one consistent user experience. Custom applications developed with SAPUI5 are responsive across browsers and devices – on smartphones, tablets, and desktops – the UI controls automatically adapt themselves to the capabilities of each device.

Virtual Forge’s CodeProfiler for HANA provides developers with detailed feedback on the code quality  of SAPUI5-based business applications, even as developers write the code – similar to the spell-checking functionality of a word processor. HANA differs fundamentally from other SAP technologies, making it difficult for programmers to maintain the security, performance levels, overall code quality and compliance necessary for custom SAP-developed programs.

CodeProfiler for HANA supports the programmers in an effective way.

The average ERP system based on SAP’s ABAP language contains two million lines of custom programming, and the numbers for customers using the newer HANA technology will probably reach similar statistics. CodeProfiler for HANA is designed to pinpoint and eliminate critical deficiencies in security, compliance, and performance early in the process of creating HANA programs. The technology interfaces with the two development environments used for HANA: Eclipse and SAP’s home-grown Web IDE tool1. It supports the programming languages used in SAP HANA, including SQLScript, XSJS, and SAPUI5.

“Businesses today must work with SAP ERP systems that are not only agile, but enable customer-facing solutions with a user interface that allows for an exciting and richly branded experience,” said Dr. Markus Schumacher, CEO of Virtual Forge. “In order to achieve this, brands must leverage technologies such as SAPUI5, but they must also have reliable protection in place to ensure their custom code and applications are secure from outside malicious attacks.”

The content-checking component offered by both CodeProfiler for ABAP and CodeProfiler for HANA includes key areas of security, compliance and data loss prevention. It also offers quality checks to ensure maintainability, robustness, and performance. Developers can also take advantage of detailed documentation of the test cases at hand. For each test case, CodeProfiler provides extensive documentation that allows a developer to understand the identified problems and associated risks. It also enables the developer to easily mitigate them.

Virtual Forge filed new technology patents for CodeProfiler, which include the following highlights:

  • Overcoming SAST limitations for dynamically typed languages by using a hybrid approach to execute the source code to be analyzed in a controlled execution environment in the form of a virtual machine.
  • Allowing code analysis during the early stages of software development.
  • Reliably reproducing tests and scans of DAST/IAST without side effects.


About Virtual Forge:

Virtual Forge is the leading provider of cyber security solutions for SAP® security. Our mission is to help customers ensure the security and quality of their SAP® systems and applications from the ground up. As pioneers in ABAP® security, we also aid SAP customers around the world in identifying security flaws and risks, fine-tuning the performance of their systems, and avoiding unnecessary investments. Virtual Forge was founded in Heidelberg, Germany, in 2001, and has offices in Heidelberg, Weimar (Germany), and Philadelphia (USA); as well as Singapore, Abu Dhabi, Rotterdam, and Madrid. For more information please visit www.VirtualForge.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.
CVE-2018-18377
PUBLISHED: 2018-10-16
goform/setReset on Orange AirBox Y858_FL_01.16_04 devices allows attackers to reset a router to factory settings, which can be used to login using the default admin:admin credentials.
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.