'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_app: solarwinds_orion_platform_rce_vul(Rule ID:1070210184)

Release Date2025/9/15

Rule NameCVE-2020-10148: Solarwinds Orion Platform Remote Code Execution Vulnerability

Severity:critical

CVE IDCVE-2020-10148

 

Descripiton

Solarwinds Orion Platform is a network failure and network performance management platform of Solarwinds, USA. The platform can provide real-time monitoring and analysis of network devices, and support custom web interfaces, a variety of user comments, and map throughout the network. SolarWinds Orion Platform exists for licensing vulnerabilities, which is from API authentication to bypass by containing specific parameters in the request. The PathInfo section requested by the URI, and an attacker can take advantage of this vulnerability to perform unauthenticated API commands. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.