'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339440)

Rule General Information
Release Date: 2025-09-03
Rule Name: Yonyou NC uploadFile.jsp Arbitrary File Upload Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: Yonyou NC is a high-end enterprise-level ERP software launched by Yonyou, designed specifically for large enterprises and corporate groups. It provides comprehensive core business management functions such as financial management, supply chain management, and human resource management, supporting complex business scenarios and high-concurrency data processing needs. Yonyou NC uploadFile.jsp has any file upload loopholes. Attackers may deploy malicious programs such as backdoors and Webshells on servers to achieve remote code execution, server control, and even further steal sensitive data or disrupt the normal operation of business systems.
Impact: Attackers can upload viruses, Trojans, WebShell, other malicious scripts or pictures containing scripts to the server, and attackers can use these files for subsequent attacks.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.