Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求是直接写文章描述,不需要开头用“文章内容总结”之类的。 首先,我仔细阅读了这篇文章。文章主要讲的是一个严重的安全漏洞CVE-2025-11953,影响了React Native社区的Metro Development Server。这个漏洞的CVSS评分是9.8,属于高危级别,允许攻击者远程执行操作系统命令。 接下来,文章提到VulnCheck公司在2025年12月21日首次观测到这个漏洞被利用。尽管已经过去一个多月,但公众对此的广泛认可还不明显。攻击者利用这个漏洞分发了一个Base64编码的PowerShell脚本,脚本会执行一系列操作,比如禁用微软 Defender 的病毒扫描,并与攻击者的服务器建立连接下载恶意软件。 此外,文章还提到攻击行为并非实验性质,而是持续性的操作使用,显示攻击者已经将其投入实际应用中。最后,作者强调了开发基础设施一旦暴露就成为生产基础设施的重要性。 现在我需要将这些信息浓缩到100字以内。首先确定关键点:漏洞名称、影响范围、CVSS评分、攻击者行为、攻击特征以及作者的观点。 可能的结构是:介绍漏洞及其影响、CVSS评分、攻击者利用方式、恶意软件特征以及开发基础设施的重要性。 然后检查字数是否符合要求。确保每个要点都简洁明了。 最后整合成一段话: “@react-native-community/cli”包中的Metro Development Server存在严重漏洞CVE-2025-11953(CVSS 9.8),允许远程攻击者执行系统命令。攻击者利用此漏洞分发恶意脚本,禁用安全软件并下载Rust编写的恶意软件。该活动表明开发基础设施一旦暴露即成为生产环境。 </think> “@react-native-community/cli”包中的Metro Development Server存在严重漏洞CVE-2025-11953(CVSS 9.8),允许远程攻击者执行系统命令。攻击者利用此漏洞分发恶意脚本,禁用安全软件并下载Rust编写的恶意软件。该活动表明开发基础设施一旦暴露即成为生产环境。 2026-2-3 14:0:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Open Source / Vulnerability

Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" npm package.

Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary operating system commands on the underlying host. Details of the flaw were first documented by JFrog in November 2025.

Despite more than a month after initial exploitation in the wild, the "activity has yet to see broad public acknowledgment," it added.

In the attack detected against its honeypot network, the threat actors have weaponized the flaw to deliver a Base64-encoded PowerShell script that, once parsed, is configured to perform a series of actions, including Microsoft Defender Antivirus exclusions for the current working directory and the temporary folder ("C:\Users\<Username>\AppData\Local\Temp").

The PowerShell script also establishes a raw TCP connection to an attacker-controlled host and port ("8.218.43[.]248:60124") and sends a request to retrieve data, write it to a file in the temporary directory, and execute it. The downloaded binary is based in Rust, and features anti-analysis checks to hinder static inspection.

The attacks have been found to originate from the following IP addresses -

  • 5.109.182[.]231
  • 223.6.249[.]141
  • 134.209.69[.]155

Describing the activity as neither experimental nor exploratory, VulnCheck said the delivered payloads were "consistent across multiple weeks of exploitation, indicating operational use rather than vulnerability probing or proof-of-concept testing."

"CVE-2025-11953 is not remarkable because it exists. It is remarkable because it reinforces a pattern defenders continue to relearn. Development infrastructure becomes production infrastructure the moment it is reachable, regardless of intent."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
如有侵权请联系:admin#unsafe.sh