Cloudflare Forces Widespread Outage to Mitigate Exploitation of Maximum Severity Vulnerability in React2Shell
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用特定的开头。首先,我得通读一下文章内容。 文章讲的是React2Shell的一个严重漏洞,CVSS评分10.0,影响React和Next.js的某些版本。亚马逊的威胁情报团队发现中国背景的黑客组织Earth Lamia和Jackpot Panda在积极利用这个漏洞。Cloudflare为了修复漏洞导致全球部分网站瘫痪,说明漏洞非常严重。作者还提到攻击者行动迅速,甚至在漏洞披露后几小时内就开始攻击。 接下来,我需要提取关键点:漏洞名称、CVSS评分、受影响版本、攻击者背景、Cloudflare的应对措施以及攻击速度。然后把这些信息浓缩成100字以内的描述。 要注意用词简洁,避免冗长。比如“严重漏洞”可以简化为“高危漏洞”。同时,要确保涵盖主要事件和影响。 最后检查一下字数是否符合要求,并确保信息准确无误。 </think> React2Shell(CVE-2025-55182)是一个CVSS评分为10.0的高危漏洞,影响React 19.x和Next.js 15.x/16.x版本。亚马逊威胁情报团队发现中国背景的黑客组织Earth Lamia和Jackpot Panda等正在积极利用该漏洞进行攻击。Cloudflare为修复漏洞导致全球部分网站瘫痪,凸显其严重性。攻击者行动迅速,在漏洞披露后数小时内即展开行动。 2025-12-8 10:36:30 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

 Just hours after a maximum severity vulnerability in React2Shell was disclosed on December 3, Amazon threat intelligence teams observed active exploitation attempts by Earth Lamia and Jackpot Panda and other China state-nexus threat groups.  

The critical vulnerability affecting React versions 19.x and Next.js versions 15.x and 16.x when App Router is in use has a Common Vulnerability Scoring System (CVSS) score of 10.0. T 

“React2Shell (CVE-2025-55182) represents a critical web supply-chain vulnerability: an easily exploitable, unauthenticated Remote Code Execution (RCE) in React Server Components (RSC),” says Noelle Murata, Sr. Security Engineer at Xcape, Inc. 

Through the flaw, attackers can “compromise applications with default configurations, and we’ve already witnessed in-the-wild exploitation within hours of its disclosure,” Murata says. 

Though the bug doesn’t affect AWS services, the researchers felt it was important to share the threat intelligence that could help their customers. 

Noting that China “continues to be the most prolific source of state-sponsored cyberthreat activity, with threat actors routinely operationalizing public exploits within hours or days of disclosure,” the researchers said through monitoring in the AWS MadPot honeypot infrastructure, “Amazon threat intelligence teams have identified both known groups and previously untracked threat clusters attempting to exploit CVE-2025-55182” and “has deployed multiple layers of automated protection through Sonaris active defense, AWS WAF managed rules (AWSManagedRulesKnownBadInputsRuleSet version 1.24 or higher), and perimeter security controls.” 

But, they warn, the protections are substitutes for patching. 

“Given the widespread exposure in cloud environments, immediate patching and compromise hunting are crucial, especially for organizations utilizing React 19 or Next.js RSC features externally,” says Murata. “The rapid weaponization of this vulnerability, which affects a core component of modern web development, necessitates that security teams prioritize the patch above all else.” 

Both React and Next.js have released security updates; however, the flaw is exploitable without authentication and remains vulnerable in the default configuration. 

To mitigate the vulnerability, Cloudflare forced a widespread outage , causing websites and online platforms worldwide to go down and sending back a “500 Internal Server Error” message. 

“This was not an attack; the change was deployed by our team to help mitigate the industry-wide vulnerability disclosed this week in React Server Components,” Cloudflare said.  

That Cloudflare took down “a chunk of the internet to emergency-patch React Server Components tells you everything about the severity calculus here,” says Michael Bell, founder and CEO at Suzu Labs.  

When the risk of exploitation outweighs the risk of a self-inflicted outage, you patch. Every organization running React 19.x or Next.js 15.x/16.x with App Router should be asking themselves: if Cloudflare couldn’t wait until a maintenance window, why can you?” he says. 

AWS said its analysis of exploitation attempts in AWS MadPot honeypot infrastructure found the exploitation attempts were coming from IP addresses and infrastructure that have been historically linked to Chinese state-nexus threat actors, though the researchers can’t offer attribution since Chinese threat groups use a shared anonymization infrastructure. Earth Lamia typically exploits web application vulnerabilities in an attempt to target organizations in Latin America, the Middle East and Southeast Asia. Its targets are typically financial services, logistics, retail, IT companies, universities, and government organizations, AWS researchers said. 

They also believe that the exploitation indicates infrastructure associated with Jackpot Panda, threat actor whose targets are typically in East and Southeast entities in East and Southeast Asia. “The activity likely aligns to collection priorities pertaining to domestic security and corruption concerns,” AWS researchers said. 

The speed at which attackers act is alarming, but it is becoming de riguerer. “Hours from disclosure to active exploitation by nation-state actors is the new normal, and it’s only going to accelerate,” says Bell. 

“China-nexus groups like Earth Lamia and Jackpot Panda have industrialized their vulnerability response: they monitor disclosures, grab public PoCs (even broken ones), and spray them at scale before most organizations have finished reading the advisory,” he says.  

Bell points to AWS’s report of attackers “debugging exploits in real-time against honeypots demonstrates this isn’t automated scanning; it’s hands-on keyboard operators racing to establish persistence before patches roll out.” 

As AI tools increasingly become “capable of parsing vulnerability disclosures and generating exploit code,” Bell expects “the window between disclosure and weaponization to shrink from hours to minutes.” 

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/12/cloudflare-forces-widespread-outage-to-mitigate-exploitation-of-maximum-severity-vulnerability-in-react2shell/
如有侵权请联系:admin#unsafe.sh