Hackers exploit critical React Native Metro bug to breach dev systems
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求是直接写文章描述,不需要特定的开头。首先,我得仔细阅读并理解这篇文章。 文章主要讲的是黑客利用React Native的Metro服务器中的一个关键漏洞CVE-2025-11953来分发恶意软件。这个漏洞影响了Windows和Linux系统。在Windows上,未经认证的攻击者可以通过POST请求执行任意操作系统命令;在Linux和macOS上,可以运行任意可执行文件,但参数控制有限。 Metro是React Native项目的默认JavaScript打包工具,在开发阶段非常重要。默认情况下,它会绑定到外部网络接口,并暴露HTTP端点用于本地开发。研究人员发现这个漏洞后,在11月初披露了它,之后出现了多个概念验证攻击。 漏洞影响了@react-native-community/cli-server-api的多个版本,已在20.0.0及以后的版本中修复。VulnCheck在12月21日观察到威胁行为者利用该漏洞进行攻击,并在之后继续分发恶意负载。 攻击中使用的payload隐藏在HTTP POST请求中,解码后会禁用端点保护、连接到攻击者控制的基础设施,并下载执行下一阶段的payload。研究人员估计有3500个暴露在外的Metro服务器在线。 尽管该漏洞被积极利用超过一个月,但EPSS评分仍较低。VulnCheck报告中包含攻击者的网络基础设施和payload的IoCs。 现在我需要将这些信息浓缩到100字以内。重点包括:黑客利用CVE-2025-11953漏洞攻击开发者,影响Windows和Linux;通过Metro服务器分发恶意软件;漏洞已修复;有3500个暴露服务器;组织应立即采取行动。 最后总结时要简洁明了,确保涵盖主要点:漏洞名称、影响系统、利用方式、修复情况、暴露服务器数量以及建议行动。 </think> 黑客利用React Native Metro服务器中的关键漏洞CVE-2025-11953向开发者分发恶意软件,影响Windows和Linux系统。该漏洞通过HTTP端点允许未认证攻击者执行任意命令或运行可执行文件。尽管已修复,仍有约3,500个暴露服务器在线面临风险。 2026-2-3 14:45:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

Hackers use critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux.

On Windows, an unauthenticated attacker can leverage the security issue to execute arbitrary OS commands via a POST request. On Linux and macOS, the vulnerability can lead to running arbitrary executables with limited parameter control.

Metro is the default JavaScript bundler for React Native projects, and it is essential for building and running applications in the development stage.

Wiz

By default, Metro can bind to external network interfaces and expose development-only HTTP endpoints (/open-url) for local use during development.

Researchers at software supply-chain security company JFrog discovered the flaw and disclosed it in early November. After the public disclosure, multiple proof-of-concept exploits emerged.

In a post at the time, they said that the issue was the /open-url HTTP endpoint accepting POST requests containing a user-supplied URL value that could be passed unsanitized to the ‘open()’ function.

The flaw affects @react-native-community/cli-server-api versions 4.8.0 through 20.0.0-alpha.2, and was fixed in version 20.0.0 and later.

On December 21, 2025, vulnerability intelligence company VulnCheck observed a threat actor exploiting CVE-2025-11953, dubbed Metro4Shell. The activity continued to deliver the same payloads on January 4th and 21st.

“Exploitation has delivered advanced payloads on both Linux and Windows, demonstrating that Metro4Shell provides a practical, cross-platform initial access mechanism” - VulnCheck

In all three attacks, the researchers observed the delivery of the same base-64 encoded PowerShell payloads hidden in the HTTP POST body of the malicious requests reaching exposed endpoints.

Once decoded and launched, the payloads perform the following actions:

  1. Disable endpoint protections by adding Microsoft Defender exclusion paths for both the current working directory and the system temporary directory using Add-MpPreference.
  2. Establish a raw TCP connection to attacker-controlled infrastructure and issue a GET /windows request to retrieve the next-stage payload.
  3. Write the received data to disk as an executable file in the system’s temporary directory.
  4. Execute the downloaded binary with a large, attacker-supplied argument string.

The Windows payload retrieved in these attacks is a Rust-based UPX-packed binary with basic anti-analysis logic. The same infrastructure hosted a corresponding “linux” binary, indicating that the attacks cover both platforms.

There are approximately 3,500 exposed React Native Metro servers exposed online, according to scans using the ZoomEye search engine for connected devices, services, and web applications.

Despite active exploitation being observed for over a month, the vulnerability still carries a low score in the Exploit Prediction Scoring System (EPSS), a risk assessment framework that estimates the likelihood of exploitation for a security issue.

"Organizations cannot afford to wait for CISA KEV inclusion, vendor reports, or broad consensus before taking action," the researchers say.

VulnCheck's report includes indicators of compromise (IoCs) for the attacker network infrastructure as well as Windows and Linux payloads.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/
如有侵权请联系:admin#unsafe.sh