'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_frame:rubyrails_xml_deserialize(Rule ID:1070110000)

Release Date2025/9/15

Rule NameCVE-2013-0156: Ruby on Rails XML Processor YAML Deserialization Code Execution

Severity:high

CVE IDCVE-2013-0156

 

Descripiton

Ruby on Rails, or simply Rails, is a server-side Web Application framework written by Ruby. Rails is a model-view-controller (MVC) framework, providing default structures for a database, a Web service, and Web pages. It encourages and facilitates the use of Web standards such as JSON or XML for data transfer, and HTML, CSS and JavaScript for display and user interfacing. Active_support/core_ext/hash/conversions.rb in Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct objext-injection attacks and execute arbitrary code, or cause a denial of service involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion. This rule supports to defend the A6: Vulnerable and Outdated Components and A8: Software and Data Integrity Failures of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.