'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339614)

Rule General Information
Release Date: 2025-11-12
Rule Name: DolphinScheduler Deserlization Vulnerability (CVE-2020-13922)
Severity:
CVE ID:
Rule Protection Details
Description: Apache DolphinScheduler is a distributed workflow orchestration platform widely used for data pipeline automation. CVE-2020-13922 arises from unsafe deserialization of user-supplied data within the data-source connection test function. An attacker able to reach the /dolphinscheduler/datasources/connect endpoint can embed a malicious serialized Java object that contains attacker-controlled class names and runtime parameters. When the server reconstructs the object, it instantiates arbitrary classes available on the application classpath, leading to remote code execution in the context of the DolphinScheduler process. Typical exploitation chains leverage gadgets already present in common dependency libraries (e.g., commons-collections, groovy, or JDBC drivers) to invoke Runtime.exec, load additional binaries, or manipulate the JVM security manager. Successful compromise grants the adversary full control over the workflow engine, allowing modification or deletion of production data pipelines, lateral movement to connected databases, credential harvesting from job configurations, and establishment of persistent backdoors inside critical data infrastructure. Because the vulnerability is pre-authentication and the product is often deployed with privileged OS or cloud accounts, the impact frequently extends beyond the single cluster to the entire data lake or analytics environment.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.