Hackers exploit critical React Native Metro bug to breach dev systems
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我先快速浏览一下文章。 文章讲的是黑客利用React Native的Metro服务器中的一个关键漏洞CVE-2025-11953来传播恶意软件。这个漏洞影响了Windows和Linux系统,允许未经身份验证的攻击者执行任意命令或运行可执行文件。Metro是React Native项目默认的JavaScript bundler,在开发阶段很重要。 研究人员在JFrog发现这个漏洞,并于11月初披露。之后出现了多个概念验证攻击。漏洞影响了@react-native-community/cli-server-api的几个版本,已经在20.0.0及以上版本修复。 VulnCheck在12月21日观察到利用该漏洞的活动,称为Metro4Shell,并在之后继续进行攻击。攻击者发送Base64编码的PowerShell负载,执行恶意操作,如禁用安全软件、下载后续payload等。大约有3500个暴露的Metro服务器在线。 尽管漏洞被积极利用超过一个月,但EPSS评分仍然较低。研究人员建议组织不要等待官方报告或共识,而是立即采取行动。 总结的时候需要包括关键点:漏洞名称、影响系统、攻击方式、受影响组件、修复版本、攻击活动情况、暴露服务器数量以及建议措施。 现在把这些信息浓缩到100字以内,确保涵盖主要信息。 </think> 黑客利用React Native Metro服务器中的关键漏洞CVE-2025-11953针对开发者,在Windows和Linux上执行恶意代码。该漏洞通过POST请求触发,默认暴露开发端点。研究人员发现后修复了版本20.0.0及以上。已有针对该漏洞的实际攻击活动,约3500个暴露服务器在线。建议组织立即采取措施应对风险。 2026-2-3 14:15:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Hackers use critical React Native Metro bug to breach dev systems

Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native to deliver malicious payloads for Windows and Linux.

On Windows, an unauthenticated attacker can leverage the security issue to execute arbitrary OS commands via a POST request. On Linux and macOS, the vulnerability can lead to running arbitrary executables with limited parameter control.

Metro is the default JavaScript bundler for React Native projects, and it is essential for building and running applications in the development stage.

Wiz

By default, Metro can bind to external network interfaces and expose development-only HTTP endpoints (/open-url) for local use during development.

Researchers at software supply-chain security company JFrog discovered the flaw and disclosed it in early November. After the public disclosure, multiple proof-of-concept exploits emerged.

In a post at the time, they said that the issue was the /open-url HTTP endpoint accepting POST requests containing a user-supplied URL value that could be passed unsanitized to the ‘open()’ function.

The flaw affects @react-native-community/cli-server-api versions 4.8.0 through 20.0.0-alpha.2, and was fixed in version 20.0.0 and later.

On December 21, 2025, vulnerability intelligence company VulnCheck observed a threat actor exploiting CVE-2025-11953, dubbed Metro4Shell. The activity continued to deliver the same payloads on January 4th and 21st.

“Exploitation has delivered advanced payloads on both Linux and Windows, demonstrating that Metro4Shell provides a practical, cross-platform initial access mechanism” - VulnCheck

In all three attacks, the researchers observed the delivery of the same base-64 encoded PowerShell payloads hidden in the HTTP POST body of the malicious requests reaching exposed endpoints.

Once decoded and launched, the payloads perform the following actions:

  1. Disable endpoint protections by adding Microsoft Defender exclusion paths for both the current working directory and the system temporary directory using Add-MpPreference.
  2. Establish a raw TCP connection to attacker-controlled infrastructure and issue a GET /windows request to retrieve the next-stage payload.
  3. Write the received data to disk as an executable file in the system’s temporary directory.
  4. Execute the downloaded binary with a large, attacker-supplied argument string.

The Windows payload retrieved in these attacks is a Rust-based UPX-packed binary with basic anti-analysis logic. The same infrastructure hosted a corresponding “linux” binary, indicating that the attacks cover both platforms.

There are approximately 3,500 exposed React Native Metro servers exposed online, according to scans using the ZoomEye search engine for connected devices, services, and web applications.

Despite active exploitation being observed for over a month, the vulnerability still carries a low score in the Exploit Prediction Scoring System (EPSS), a risk assessment framework that estimates the likelihood of exploitation for a security issue.

"Organizations cannot afford to wait for CISA KEV inclusion, vendor reports, or broad consensus before taking action," the researchers say.

VulnCheck's report includes indicators of compromise (IoCs) for the attacker network infrastructure as well as Windows and Linux payloads.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-use-critical-react-native-metro-bug-to-breach-dev-systems/
如有侵权请联系:admin#unsafe.sh