'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_other:activemq_arbitrary_file_write_vul(Rule ID:1070310178)

Release Date2025/9/15

Rule NameCVE-2016-3088: ActiveMQ Arbitrary File Write Vulnerability

Severity:critical

CVE IDCVE-2016-3088

 

Descripiton

Apache ActiveMQ is an open source messaging middleware from the Apache Software Foundation. Apache ActiveMQ 5.14.0. There is a security vulnerability in the X version of the Fileserver Web application. Remote attackers can exploit this vulnerability by sending HTTP PUT and HTTP MOVE requests to upload and execute arbitrary files. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.