'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:333888)

Rule General Information
Release Date: 2025-11-11
Rule Name: Sensitive Directory .git Access Detection
Severity:
CVE ID:
Rule Protection Details
Description: By obtaining critical sensitive information, an attacker can further harm the target of penetration. The.git folder is a very important part of the Git version control system, which stores the entire history and metadata information of the project. This rule is used to detect suspicious attempts to obtain information about.git folders.
Impact: By obtaining sensitive files or directories, an attacker can obtain critical system information and cause other harm to the target.
Affected OS: Windows, Linux, Others
Reference:
Solutions
1. Ensure that file system permissions on the Web server and applications are properly set to limit access to sensitive files and directories. 2. Check the access records of the system for unauthorized access. 3. Ensure that systems and applications are updated to the latest version and fix known vulnerabilities to minimize system impact.