React2Shell critical flaw actively exploited in China-linked attacks
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是React2Shell漏洞,影响React和Next.js。这是一个高危漏洞,利用起来不需要认证,可以在服务器上下文执行JS代码。接下来提到多个与中国相关的威胁组织开始利用这个漏洞,比如Earth Lamia和Jackpot Panda。攻击活动在漏洞公开后几小时内就开始了。 还有提到已经有PoC被发布,攻击者使用这些工具进行多次尝试,包括执行命令、创建文件等。React和Next.js已经发布了安全更新,但因为容易被利用,风险依然很高。 总结的时候要涵盖:漏洞名称、影响范围、攻击者是谁、攻击开始的时间、PoC的存在以及修复情况。控制在100字以内,所以需要简洁明了。 可能会这样组织:React2Shell漏洞被多个中国威胁组织迅速利用,影响React和Next.js框架。该漏洞允许远程代码执行,已有PoC发布。尽管有修复措施,但风险仍高。 检查一下字数是否符合要求,并确保没有使用“文章内容总结”之类的开头。 </think> React2Shell漏洞(CVE-2025-55182)影响React和Next.js框架,允许无认证远程代码执行。多个中国关联的威胁组织如Earth Lamia和Jackpot Panda迅速利用此漏洞进行攻击。已有PoC被发布,尽管修复措施已推出,但风险仍高。 2025-12-5 11:30:37 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

React2Shell critical flaw actively exploited in China-linked attacks

Multiple China-linked threat actors began exploiting the React2Shell vulnerability (CVE-2025-55182) affecting React and Next.js just hours after the max-severity issue was disclosed.

React2Shell is an insecure deserialization vulnerability in the React Server Components (RSC) 'Flight' protocol. Exploiting it does not require authentication and allows remote execution of JavaScript code in the server's context.

For the Next.js framework, there is the identifier CVE-2025-66478, but the tracking number was rejected in the National Vulnerability Database's CVE list as a duplicate of CVE-2025-55182.

The security issue is easy to leverage, and several proof-of-concept (PoC) exploits have already been published, increasing the risk of related threat activity.

The vulnerability spans several versions of the widely used library, potentially exposing thousands of dependent projects. Wiz researchers say that 39% of the cloud environments they can observe are susceptible to React2Shell attacks.

React and Next.js have released security updates, but the issue is trivially exploitable without authentication and in the default configuration.

React2Shell attacks underway

A report from Amazon Web Services (AWS) warns that the Earth Lamia and Jackpot Panda threat actors linked to China started to exploit React2Shell almost immediately after the public disclosure.

"Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active exploitation attempts by multiple China state-nexus threat groups, including Earth Lamia and Jackpot Panda," reads the AWS report.

AWS's honeypots also caught activity not attributed to any known clusters, but which still originates from China-based infrastructure.

Many of the attacking clusters share the same anonymization infrastructure, which further complicates individualized tracking and specific attribution.

Regarding the two identified threat groups, Earth Lamia focuses on exploiting web application vulnerabilities.

Typical targets include entities in the financial services, logistics, retail, IT companies, universities, and government sectors across Latin America, the Middle East, and Southeast Asia.

Jackpot Panda targets are usually located in East and Southeast Asia, and its attacks are aimed at collecting intelligence on corruption and domestic security.

PoCs now available

Lachlan Davidson, the researcher who discovered and reported React2Shell, warned about fake exploits circulating online. However, exploits confirmed as valid by Rapid7 researcher Stephen Fewer and Elastic Security's Joe Desimone have appeared on GitHub.

The attacks that AWS observed leverage a mix of public exploits, including broken ones, along with iterative manual testing and real-time troubleshooting against targeted environments.

The observed activity includes repeated attempts with different payloads, Linux command execution (whoami, id), attempts to create files (/tmp/pwned.txt), and attempts to read '/etc/passwd/.'

"This behavior demonstrates that threat actors aren't just running automated scans, but are actively debugging and refining their exploitation techniques against live targets," comment AWS researchers.

Attack surface management (ASM) platform Assetnote has released a React2Shell scanner on GitHub that can be used to determine if an environment is vulnerable to  React2Shell.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/react2shell-critical-flaw-actively-exploited-in-china-linked-attacks/
如有侵权请联系:admin#unsafe.sh