How to detect React2Shell with Burp Suite
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读这篇文章,了解主要内容。 文章主要讲的是React2Shell漏洞在Next.js应用中的检测方法,使用Burp Suite Professional和DAST版本。还提到了如何安装ActiveScan++扩展和Bambda自定义扫描检查。此外,文章还提到React2Shell的严重性,CVSS评分10.0,影响广泛。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖主要技术点:Burp Suite的两个版本、ActiveScan++、Bambda、漏洞的严重性和影响范围。 可能的结构是:介绍检测工具和方法,然后提到漏洞的影响。这样既简洁又全面。 最后,检查字数是否在限制内,并确保语言流畅自然。 </think> 文章介绍了如何使用Burp Suite Professional和DAST版本检测Next.js应用中的React2Shell漏洞,并提供了安装ActiveScan++扩展和Bambda自定义扫描检查的方法。React2Shell是一种严重的远程代码执行漏洞,CVSS评分为10.0,影响广泛。 2025-12-5 13:53:30 Author: portswigger.net(查看原文) 阅读量:12 收藏

Tom Ryder | 05 December 2025 at 13:53 UTC

Detecting React2Shell with Burp Suite

React2Shell vulnerabilities in Next.js applications are now scannable across Burp Suite, making it fast to validate your exposure and begin automated coverage using:

Both editions of Burp Suite now have access to the latest React2Shell detection logic for Next.js with ActiveScan++ (v2.0.8). Burp Suite Professional also enables targeted custom scan checks for deeper investigation.

How to test for React2Shell in Burp Suite Professional

Manual testing, instant visibility

Burp Suite Professional lets you quickly investigate React2Shell behaviour and validate specific endpoints during hands-on testing. You have two main detection options:

  1. ActiveScan++ (v2.0.8) – recommended

    Ensure you have the latest version of ActiveScan++, which includes a dedicated React2Shell check, giving you automated detection directly inside Burp Suite Professional. Once installed, it:

    • Adds React2Shell coverage into your existing manual workflow
    • Runs automatically as part of your active scanning
    • Is ideal for quick investigation and triage of suspected Next.js (React server components) targets

    Note: Current automated checks focus on Next.js applications. Other React frameworks may still require manual investigation and bespoke testing.


  2. Custom scan check (Bambda) for targeted checks

    If you need more focused, on-demand testing, you can import the community-created React2Shell Bambda and run it against specific endpoints or applications.

    This is ideal for quickly validating a suspected vulnerable app or probing specific components to reproduce reported behaviour.

    How to import and run the custom scan check:

    • Download the Bambda
    • In Burp Suite Professional, go to Extensions > Bambda library.
    • Click Import. The Import scripts dialog opens.
    • Select .bambda files or a folder containing .bambda files.
    • Click Open.

How to scan for React2Shell in Burp Suite DAST

If you need to understand React2Shell exposure across many applications or environments, Burp Suite DAST gives you continuous, automated detection at scale.

ActiveScan++ (v2.0.8) in Burp Suite DAST

Burp Suite DAST supports the updated ActiveScan++ extension. Once installed, ActiveScan++ enables automated React2Shell coverage across your Next.js estate, with scans running on a schedule or through your CI/CD pipelines, and results delivered centrally to your AppSec team.

How to enable ActiveScan++ in Burp Suite DAST


Start scanning now

Whether you are using Burp Suite Professional yourself or Burp Suite DAST for broad, automated coverage, you can start detecting Next.js-based React2Shell today.

  • Install or update ActiveScan++ v2.0.8 in either product.
  • (Optional) Add the React2Shell Bambda custom scan check to your Burp Suite Professional application for targeted tests.

We will continue to publish updates as more information and broader detection techniques for other React frameworks become available.

Join the React2Shell conversation now

We would love to hear from you. Jump into the PortSwigger Discord to share feedback, tips, and requests with the team and the community.

Join the PortSwigger Discord.


What is React2Shell?

Two new critical vulnerabilities, collectively known as React2Shell (CVE-2025-55182 and CVE-2025-66478), are rapidly gaining traction in the security community. With a CVSS score of 10.0 and unauthenticated remote code execution, many expect a trajectory similar to Log4j, including rapid weaponisation by ransomware groups.

React2Shell affects React and Next.js applications and potentially other frameworks that use React server components.

Because these frameworks underpin a huge number of production apps, a successful exploit can lead to major compromise. For most teams, this should be treated as a high-priority incident.

Early proof-of-concept checks have mostly focused on detecting the presence of React server components. That is not enough to determine exploitability, and not all public PoCs are reliable.

Important: Even if your application does not explicitly call server actions, it may still be vulnerable, as long as it supports React server components.


文章来源: https://portswigger.net/blog/how-to-detect-react2shell-with-burp-suite
如有侵权请联系:admin#unsafe.sh