'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

web_app:inspur_ps_rce(Rule ID:1070210513)

Release Date2025/9/15

Rule NameInspur PS AllotOrderSrv.asmx Remote Code Execution Vulnerability

Severity:critical

CVE ID

 

Descripiton

Inspur PS financial management solution includes general ledger management, fixed assets, bill printing, bill management, cost accounting, fund interest calculation, online reimbursement and other financial accounting parts, as well as report management, report summary, financial analysis, cash flow and other analysis reports. The AllotOrderSrv.asmx financial system of Inspur PS has a remote code execution vulnerability, which allows attackers to upload Base64 encoded .net serialization payload, executes arbitrary commands on the server and ultimately controls the server. This rule supports to defend the A6: Vulnerabe and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.