'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_srv:iis_craft_extension(Rule ID:1070010003)

Release Date2025/9/15

Rule NameCVE-2009-4444: Microsoft IIS Crafted Extensions Security Bypass

Severity:mid

CVE IDCVE-2009-4444

 

Descripiton

Internet Information Services (IIS) is an extensible Web server created by Microsoft. IIS is a Web service components, including Web server, FTP server, NNTP server and SMTP server, respectly used for Web browsing, file transfer, news services and email, etc.. IIS makes it convenient for users to publish information on network. Microsoft IIS 5.x and 6.x uses only the portion of a filename before a ; character to determine the file extension, which allows remote attackers to bypass intended extension restrictions of third-party upload applications via a file name with a (1).asp, (2).cer, or (3).asa first extension, followed by a semicolon and a safe extension, as demonstrated by the use of asp.dll to handle a .asp;.jpg file. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.