'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

infoleak_other:office_doc_property_leak(Rule ID:1040500001)

Release Date2025/9/15

Rule NameMicrosoft Office Document Properties Leakage

Severity:high

CVE ID

 

Descripiton

Microsoft Office is an office suite of applications, servers, and services developed by Microsoft, including Word, Excel, PowerPoint, Access, Outlook, etc.. This rule inspects the server error information in HTTP response to prevent information leakage. This rule supports to defend the A2: Cryptographic Failures of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.