-
Notifications
You must be signed in to change notification settings - Fork 612
[New] React2Shell Network Security Alert #5445
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
Samirbous
wants to merge
17
commits into
main
Choose a base branch
from
react_network_detection
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+113
−1
Open
Changes from all commits
Commits
Show all changes
17 commits
Select commit
Hold shift + click to select a range
1654e0c
[New] React2Shell Network Security Alert
Samirbous 8f6dc2b
Update initial_access_react_server_rce_network_alerts.toml
Samirbous c97cf58
cisco_ftd schema
Samirbous 49829f9
Update initial_access_react_server_rce_network_alerts.toml
Samirbous 370712e
Merge branch 'main' into react_network_detection
Samirbous 9446737
Update pyproject.toml
Samirbous 49cdf85
Merge branch 'main' into react_network_detection
Samirbous 13d473d
Merge branch 'main' into react_network_detection
Samirbous 3fd2c94
Update rules/network/initial_access_react_server_rce_network_alerts.toml
Samirbous 39e1f5e
Update pyproject.toml
Samirbous 1494d4a
Revert "cisco_ftd schema"
Samirbous 6e8edb7
Merge branch 'react_network_detection' of https://github.com/elastic/…
Samirbous 0021de3
Merge branch 'main' into react_network_detection
Samirbous ff2200f
cisco_ftd schema and manifest
Samirbous ca912f1
Merge branch 'react_network_detection' of https://github.com/elastic/…
Samirbous d382fcd
Update pyproject.toml
Samirbous cbf78bd
Merge branch 'main' into react_network_detection
Samirbous File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
Binary file not shown.
Binary file not shown.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
112 changes: 112 additions & 0 deletions
112
rules/network/initial_access_react_server_rce_network_alerts.toml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,112 @@ | ||
| [metadata] | ||
| creation_date = "2025/12/10" | ||
| integration = ["panw", "cisco_ftd", "fortinet_fortigate", "suricata"] | ||
| maturity = "production" | ||
| updated_date = "2025/12/10" | ||
|
|
||
| [rule] | ||
| author = ["Elastic"] | ||
| description = """ | ||
| This rule identifies network security alerts related to CVE-2025-55182 exploitation attempts from different network security | ||
| integrations. CVE-2025-55182 is a critical remote code execution vulnerability in React Server Components (RSC) Flight protocol. | ||
| The vulnerability allows attackers to execute arbitrary code on the server by sending specially crafted deserialization payloads | ||
| that exploit prototype chain traversal to access the Function constructor. | ||
| """ | ||
| from = "now-9m" | ||
| index = ["logs-panw.panos*", "logs-cisco_ftd.*", "logs-fortinet_fortigate.*", "logs-suricata.*"] | ||
| language = "kuery" | ||
| license = "Elastic License v2" | ||
| name = "React2Shell Network Security Alert" | ||
| note = """## Triage and analysis | ||
|
|
||
| ### Investigating React2Shell Network Security Alert | ||
|
|
||
| This rule detects exploitation attempts targeting CVE-2025-55182, a critical remote code execution vulnerability in React's Flight protocol used by Next.js and other RSC implementations. The vulnerability stems from insecure prototype chain traversal in the Flight deserializer, allowing attackers to access `__proto__`, `constructor`, and ultimately the `Function` constructor to execute arbitrary code. | ||
|
|
||
| ### Possible investigation steps | ||
|
|
||
| - Examine the full HTTP request body to identify the specific attack payload and command being executed. | ||
| - Check the response body for `E{"digest":"..."}` patterns which contain command output from successful exploitation. | ||
| - Identify the target application and verify if it runs vulnerable React (< 19.1.0) or Next.js (< 15.3.2) versions. | ||
| - Review the source IP for other reconnaissance or exploitation attempts against web applications. | ||
| - Check for the `Next-Action` header which is required for the exploit to work. | ||
| - Correlate with process execution logs to identify if child processes (e.g., shell commands) were spawned by the Node.js process. | ||
|
|
||
| ### False positive analysis | ||
|
|
||
| - Legitimate React Server Components traffic will NOT contain `__proto__`, `constructor:constructor`, or code execution patterns. | ||
| - Security scanning tools like react2shell-scanner may trigger this rule during authorized penetration testing. | ||
| - The combination of prototype pollution patterns with RSC-specific syntax is highly indicative of malicious activity. | ||
|
|
||
| ### Response and remediation | ||
|
|
||
| - Immediately update affected applications: React >= 19.1.0, Next.js >= 15.3.2. | ||
| - Block the source IP at the WAF/reverse proxy if exploitation is confirmed. | ||
| - If HTTP 500 or 303 responses with `digest` output were observed, assume successful code execution and investigate for compromise. | ||
| - Review server logs for evidence of command execution (file creation, network connections, process spawning). | ||
| - Implement WAF rules to block requests containing `__proto__` or `constructor:constructor` in POST bodies. | ||
| """ | ||
| references = [ | ||
| "https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182", | ||
| "https://github.com/assetnote/react2shell-scanner", | ||
| "https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/", | ||
| "https://github.com/msanft/CVE-2025-55182", | ||
| ] | ||
| risk_score = 73 | ||
| rule_id = "1aefed68-eecd-47cc-9044-4a394b60061d" | ||
| severity = "high" | ||
| tags = [ | ||
| "Domain: Network", | ||
| "Domain: Application", | ||
| "Domain: Web", | ||
| "Use Case: Threat Detection", | ||
| "Use Case: Vulnerability", | ||
| "Tactic: Initial Access", | ||
| "Tactic: Execution", | ||
| "Data Source: PAN-OS", | ||
| "Data Source: Fortinet", | ||
| "Data Source: Suricata", | ||
| "Data Source: Cisco FTD", | ||
| "Resources: Investigation Guide", | ||
| ] | ||
| timestamp_override = "event.ingested" | ||
| type = "query" | ||
|
|
||
| query = ''' | ||
| (event.dataset:"cisco_ftd.log" and message:"SERVER-WEBAPP React Server Components remote code execution attempt") or | ||
| (event.dataset:"fortinet_fortigate.log" and message:"applications3: React.Server.Components.react-flight.Remote.Code.Execution") or | ||
| (event.dataset:"panw.panos" and event.action:"exploit_detected" and event.original :*React*Server*) or | ||
| (event.dataset:("suricata_corelight" or "suricata.eve") and rule.name:*CVE-2025-55182*) | ||
| ''' | ||
|
|
||
|
|
||
| [[rule.threat]] | ||
| framework = "MITRE ATT&CK" | ||
| [[rule.threat.technique]] | ||
| id = "T1190" | ||
| name = "Exploit Public-Facing Application" | ||
| reference = "https://attack.mitre.org/techniques/T1190/" | ||
|
|
||
|
|
||
| [rule.threat.tactic] | ||
| id = "TA0001" | ||
| name = "Initial Access" | ||
| reference = "https://attack.mitre.org/tactics/TA0001/" | ||
| [[rule.threat]] | ||
| framework = "MITRE ATT&CK" | ||
| [[rule.threat.technique]] | ||
| id = "T1059" | ||
| name = "Command and Scripting Interpreter" | ||
| reference = "https://attack.mitre.org/techniques/T1059/" | ||
| [[rule.threat.technique.subtechnique]] | ||
| id = "T1059.007" | ||
| name = "JavaScript" | ||
| reference = "https://attack.mitre.org/techniques/T1059/007/" | ||
|
|
||
|
|
||
|
|
||
| [rule.threat.tactic] | ||
| id = "TA0002" | ||
| name = "Execution" | ||
| reference = "https://attack.mitre.org/tactics/TA0002/" | ||
|
|
||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.