'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_app: oracle_weblogic_jboss_interceptors_deserialization_of_untrusted_data_remote_code_exec(Rule ID:1070210093)

Release Date2025/9/15

Rule NameCVE-2016-3510: Oracle WebLogic Jboss Interceptors Deserialization of Untrusted Data Remote Code Execution Vulnerability

Severity:critical

CVE IDCVE-2016-3510

 

Descripiton

The specific exists in the use of JBoss Interceptors library. By sending a specially crafted request, the application can be made to deseriallze untrusted data during thee handling of the request. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.