{"id":468,"date":"2018-04-04T08:00:10","date_gmt":"2018-04-04T06:00:10","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=468"},"modified":"2020-07-07T11:44:52","modified_gmt":"2020-07-07T09:44:52","slug":"with-header-line-not-only-obsolete-but-also-unsafe","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/","title":{"rendered":"WITH HEADER LINE \u2013 it&#8217;s not simply obsolete; it&#8217;s a risk."},"content":{"rendered":"<p><span style=\"color: #626161;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-46 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg\" alt=\"shutterstock_424352977_akqw_jpg\" width=\"300\" height=\"199\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg-300x200.jpg 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The addition &#8220;WITH HEADER LINE&#8221; has technically been unnecessary going back several SAP versions now. This is because the statement declares both internal tables and an additional data object \u2013 the header line.<\/span><\/p>\n<p><span style=\"color: #626161;\">There are a large number of notes that spread awareness that the use of this statement causes various content problems. Among other things, the use of the same name means that it is not immediately apparent as to whether you are working on a table or a header line.<\/span><\/p>\n<p><span style=\"color: #626161;\">However, what the notes typically do not warn you about is that this kind of programming goes hand in hand with security problems for your SAP systems.<\/span><\/p>\n<p><span style=\"color: #626161;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #626161;\">Despite everything, header lines can still be found in a great deal of program code. The typical argument is that using a header line is the only way to use short forms. That ensures that the structure to be added no longer needs to be specified explicitly.<\/span><\/p>\n<p><span style=\"color: #626161;\">Example:<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-472\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb01_1804_en.png\" alt=\"SAST-Blog_Headerline_Abb01_1804_en\" width=\"550\" height=\"174\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb01_1804_en.png 537w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb01_1804_en-300x94.png 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p><span style=\"color: #626161;\"><strong>How this becomes a security risk to your SAP systems<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\">SAP systems, too, have been capable of Unicode for a long time now, which allows other non-Latin scripts to be used. All scripts are considered equivalent and can be used in parallel. This means that a user cannot recognize whether the letter in SAP is in a Latin or Cyrillic script.<\/span><\/p>\n<p><span style=\"color: #626161;\">Moreover, all SAP versions have used the table &#8220;TRMAC&#8221; for many years now. This table is used to have SAP global macros available to shorten code.<\/span><\/p>\n<p><span style=\"color: #626161;\">If the three options (short form + Unicode-enabled + table &#8220;TRMAC&#8221;) are combined, it is now possible to effectively hide code.<\/span><\/p>\n<p><span style=\"color: #626161;\">For example, code is created in TRMAC that is similar to the short form. However, the first letter is replaced by its Cyrillic equivalent. Even experienced developers will not typically immediately notice the switch in code when viewing the TRMAC table with transaction &#8220;SM30&#8221;.<\/span><\/p>\n<p><span style=\"color: #626161;\">TRMAC<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-473\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb02_1804_en.png\" alt=\"SAST-Blog_Headerline_Abb02_1804_en\" width=\"551\" height=\"133\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb02_1804_en.png 699w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb02_1804_en-300x72.png 300w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><\/p>\n<p><span style=\"color: #626161;\">Code<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-474\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb03_1804_en.png\" alt=\"SAST-Blog_Headerline_Abb03_1804_en\" width=\"551\" height=\"176\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb03_1804_en.png 535w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb03_1804_en-300x96.png 300w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><\/p>\n<p><span style=\"color: #626161;\">Despite this, the program executes the macro and continues running without any visible errors:<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-475\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb04_1804_en.png\" alt=\"SAST-Blog_Headerline_Abb04_1804_en\" width=\"247\" height=\"98\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb04_1804_en.png 368w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb04_1804_en-300x119.png 300w\" sizes=\"auto, (max-width: 247px) 100vw, 247px\" \/><\/p>\n<p><span style=\"color: #626161;\">The only visible difference is in the editor: key words are color-coded, but macros are not. Many developers often consider key words that are not color coded as something to which no changes have been made, and thus they fall through the cracks.<\/span><\/p>\n<p><span style=\"color: #626161;\">Even if the corresponding code is searched using &#8220;APPEND&#8221;, you will find it only by copying the macro from the TRMAC table and pasting it into the search field.\u00a0The best known internal table with a header line (which is still used today) is table SCREEN, in which you can edit dynpro fields before displaying them. The above example also works with this.<\/span><\/p>\n<p><span style=\"color: #626161;\"><strong>How to protect your SAP systems from hidden ABAP code<\/strong><\/span><\/p>\n<p><span style=\"color: #626161;\">Use only code that is written correctly and avoid abbreviated versions. This means that the structure must be specified explicitly and more words will be included in the statement.<\/span><\/p>\n<p><span style=\"color: #626161;\">Ensure that definitions are required for additional variables. Developers are much more likely to notice variables named &#8220;FROM&#8221;, &#8220;INTO&#8221; or &#8220;TO&#8221; in their program code, especially if the advanced syntax check is performed:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-476\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb05_1804_en.png\" alt=\"SAST-Blog_Headerline_Abb05_1804_en\" width=\"551\" height=\"182\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb05_1804_en.png 524w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/sast-blog_headerline_abb05_1804_en-300x99.png 300w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><\/p>\n<p><span style=\"color: #616262;\">The use of the SCREEN table with the abbreviated notation has been obsolete since some SAP releases. Therefore, use the following syntax instead:<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-507\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/sast-blog_headerline_abb06_1804.png\" alt=\"SAST-Blog_Headerline_Abb06_1804\" width=\"350\" height=\"141\" \/><br \/>\n<\/span><\/p>\n<h6><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-469\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/markusrest-e1522588795641.jpg\" alt=\"MarkusRest\" width=\"129\" height=\"146\" \/><br \/>\n<span style=\"color: #626161;\">Markus Rest<\/span><br \/>\n<span style=\"color: #626161;\"> SAP ABAP Development<\/span><\/h6>\n<p><span style=\"color: #626161;\">Are you looking forward to further tips and recommendations in the field of SAP Security and Compliance? There are plenty of opportunities to engage with us \u2013 in one of our <a href=\"https:\/\/sast-solutions.de\/en\/news\/events-webinars\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">webinars<\/a>, for example.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The addition &#8220;WITH HEADER LINE&#8221; has technically been unnecessary going back several SAP versions now. This is because the statement declares both internal tables and an additional data object \u2013 the header line.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[156,80,114],"class_list":["post-468","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-security","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WITH HEADER LINE \u2013 it&#039;s not simply obsolete; it&#039;s a risk.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WITH HEADER LINE \u2013 it&#039;s not simply obsolete; it&#039;s a risk.\" \/>\n<meta property=\"og:description\" content=\"The addition &quot;WITH HEADER LINE&quot; has technically been unnecessary going back several SAP versions now. This is because the statement declares both internal tables and an additional data object \u2013 the header line.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-04T06:00:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T09:44:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"WITH HEADER LINE \u2013 it&#8217;s not simply obsolete; it&#8217;s a risk.\",\"datePublished\":\"2018-04-04T06:00:10+00:00\",\"dateModified\":\"2020-07-07T09:44:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\",\"keywords\":[\"Cyber Security\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/\",\"name\":\"WITH HEADER LINE \u2013 it's not simply obsolete; it's a risk.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\",\"datePublished\":\"2018-04-04T06:00:10+00:00\",\"dateModified\":\"2020-07-07T09:44:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/shutterstock_424352977_akqw_jpg.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/04\\\/with-header-line-not-only-obsolete-but-also-unsafe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WITH HEADER LINE \u2013 it&#8217;s not simply obsolete; it&#8217;s a risk.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WITH HEADER LINE \u2013 it's not simply obsolete; it's a risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/","og_locale":"en_US","og_type":"article","og_title":"WITH HEADER LINE \u2013 it's not simply obsolete; it's a risk.","og_description":"The addition \"WITH HEADER LINE\" has technically been unnecessary going back several SAP versions now. This is because the statement declares both internal tables and an additional data object \u2013 the header line.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/","og_site_name":"SAST BLOG","article_published_time":"2018-04-04T06:00:10+00:00","article_modified_time":"2020-07-07T09:44:52+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"WITH HEADER LINE \u2013 it&#8217;s not simply obsolete; it&#8217;s a risk.","datePublished":"2018-04-04T06:00:10+00:00","dateModified":"2020-07-07T09:44:52+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/"},"wordCount":573,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","keywords":["Cyber Security","SAP Security","Threat Detection"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/","name":"WITH HEADER LINE \u2013 it's not simply obsolete; it's a risk.","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","datePublished":"2018-04-04T06:00:10+00:00","dateModified":"2020-07-07T09:44:52+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/shutterstock_424352977_akqw_jpg.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/04\/with-header-line-not-only-obsolete-but-also-unsafe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"WITH HEADER LINE \u2013 it&#8217;s not simply obsolete; it&#8217;s a risk."}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=468"}],"version-history":[{"count":2,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/468\/revisions"}],"predecessor-version":[{"id":1284,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/468\/revisions\/1284"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}