'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_frame:rubyrails_json_deserialize(Rule ID:1070110001)

Release Date2025/9/15

Rule NameCVE-2013-0333: WEB Ruby on Rails JSON Processor YAML Deserialization Code Execution

Severity:high

CVE IDCVE-2013-0333

 

Descripiton

Ruby on Rails, or simply Rails, is a server-side Web Application framework written by Ruby. Rails is a model-view-controller (MVC) framework, providing default structures for a database, a Web service, and Web pages. It encourages and facilitates the use of Web standards such as JSON or XML for data transfer, and HTML, CSS and JavaScript for display and user interfacing. Lib/active_support/json/backends/yaml.rb in Rails 2.3.x before 2.3.15 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding. This rule supports to defend the A6: Vulnerable and Outdated Components and A8: Software and Data Integrity Failures of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.