';
}
else{
echo ' ';
}
echo '
Hillstone Networks ';
} elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") {
echo ' ';
echo 'huaantech ';
} elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") {
echo ' ';
echo 'dcnetworks ';
} elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") {
if (false===strpos($_SERVER[REQUEST_URI],"/en/"))
echo ' ';
else
echo ' ';
echo 'w-ibeda ';
} elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") {
echo ' ';
echo 'hp-telecom ';
} elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") {
echo ' ';
echo 'Maipu ';
} elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") {
echo ' ';
echo 'Ncurity ';
} elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") {
echo ' ';
echo 'Socusnetwork ';
} else{
echo ' ';
echo 'Hillstone Networks ';
}
?>
vul_other:apache_kafka_jndi_injection_vul(Rule ID:1070310176)
Release Date :2025/9/15
Rule Name :CVE-2023-25194: Apache Kafka JNDI Injection Vulnerability
Severity :high
CVE ID :CVE-2023-25194
Apache Kafka is a data stream processing module. Attackers are able to trigger RCE of JNDI by creating or modifying connector on SASL protocol, when Apache Kafka Connect is under attackers control. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None
Update vendor patches.