'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

infoleak_dircont:iis_install_in_default_loc(Rule ID:1040200000)

Release Date2025/9/15

Rule NameIIS Installed in Default Location

Severity:high

CVE ID

 

Descripiton

Internet Information Services (IIS) is an extensible Web server created by Microsoft. IIS is a Web service components, including Web server, FTP server, NNTP server and SMTP server, respectively used for Web browsing, file transfer, news services and email, etc.. IIS makes it convenient for users to publish information on network. The WebDAV extension in Microsoft IIS allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af at an arbitrary position in the URI. This rule inspects the server error information in HTTP response to prevent information leakage. This rule supports to defend the A2: Cryptographic Failures of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.