'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_app:weaver_ecology_deleteUserRequestInfoByXml_xxe_vul(Rule ID:1070210484)

Release Date2025/9/15

Rule NameWeaver E-Cology deleteUserRequestInfoByXml XML Enternal Entity Injection Vulnerability

Severity:high

CVE ID

 

Descripiton

Weaver E-cology is a high-end collaborative office system designed for large enterprises and groups. It provides comprehensive functions such as process management, knowledge management, and project management. It supports multiple organizations, departments, and users, helping enterprises achieve efficient collaboration and digital transformation. There is an XXE vulnerability in the deleteUserRequestInfoByXml interface of Weaver E-cology. Attackers can exploit this vulnerability by using a malicious XML document to load external entities, thereby stealing server files, executing commands, or launching man-in-the-middle attacks, which seriously threaten the security of the system.This rule supports to defend the A6: Vulnerabe and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.