'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339606)

Rule General Information
Release Date: 2025-11-12
Rule Name: Atlassian Confluence OGNL Remote Code Execution Vulnerability (CVE-2022-26134)
Severity:
CVE ID:
Rule Protection Details
Description: Atlassian Confluence is a widely deployed enterprise wiki and collaboration platform. CVE-2022-26134 is a critical, pre-authentication remote code execution flaw that stems from unsafe evaluation of OGNL (Object-Graph Navigation Language) expressions. Attackers can embed malicious OGNL in HTTP requests to reach the server-side expression interpreter, bypassing authentication and security controls. Successful exploitation grants the adversary full control of the Confluence host, enabling arbitrary command execution, lateral movement, deployment of ransomware, data exfiltration, or persistent backdoor installation. Because Confluence often integrates with corporate identity systems and stores sensitive project data, compromise frequently escalates to domain-level access and exposes intellectual property, customer records, and internal documentation.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.