关联漏洞
描述
CVE-2025-11953
介绍
# 🚨 **CVE-2025-11953: Critical RCE in React Native CLI** 🚨

**A severe vulnerability allowing unauthenticated remote code execution (RCE) on developer machines running React Native. Discovered by JFrog Security, this flaw carries a CVSS score of 9.8 and affects millions of developers worldwide.**
---
## 📊 **Key Facts at a Glance**
| **Aspect** | **Details** |
|-------------------------|-----------------------------------------------------------------------------|
| **🆔 CVE ID** | CVE-2025-11953 |
| **⚠️ Severity** | **CRITICAL** (CVSS v3.1: **9.8**) – Network, Low Complexity, No Privileges Required |
| **🛡️ Affected Package** | `@react-native-community/cli-server-api` **v4.8.0 – v20.0.0-alpha.2** |
| **📈 Weekly Downloads** | **Over 2 million** (NPM registry data) |
| **🔓 Vulnerability Type**| OS Command Injection via Metro Dev Server `/open-url` endpoint |
| **🩹 Fixed Version** | **v20.0.0** (Released October 2025) |
| **📅 Published** | November 4, 2025 (NVD entry: November 5, 2025) |
| **🌐 Public Exposure** | **Over 4,600 instances** detectable via public scans (ZoomEye) |
---
## 🎯 **How the Attack Works**

1. **Metro Dev Server** (part of React Native CLI) listens on **0.0.0.0:8081** by default — binding to **all network interfaces**.
2. If the host is on a public or shared network (e.g., public Wi-Fi, misconfigured cloud VM), the server is **directly accessible from the internet**.
3. Attacker sends a **malicious POST request** to the `/open-url` endpoint.
4. The endpoint **fails to sanitize the `url` parameter**, allowing **OS command injection**.
5. Commands execute with the **privileges of the developer user** — full control over the machine.
### **Proof-of-Concept (PoC) Example**
```http
POST /open-url HTTP/1.1
Host: vulnerable-dev-machine:8081
Content-Type: application/json
{"url": "; calc.exe"} // Windows
{"url": "; whoami"} // Linux/macOS
```
**Result**: Arbitrary system commands run instantly. On Windows, Calculator launches; on Unix, user identity is returned — proof of full RCE.
---
## 🛡️ **Mitigation Steps (Act Now)**
### 1. **Update Immediately**
```bash
npm update @react-native-community/cli @react-native-community/cli-server-api
```
- Ensure version is **>= 20.0.0**
- Run `npm list @react-native-community/cli-server-api` to verify
### 2. **Bind to Localhost Only**
```bash
npx react-native start --host localhost
```
Prevents external access even if firewall is misconfigured.
### 3. **Firewall Rules**
- **Block inbound traffic** to port **8081** from external networks
- Allow only **127.0.0.1** or internal IPs
### 4. **Use VPN or Secure Networks**
Never run dev servers on public Wi-Fi or untrusted networks.
### 5. **Scan for Exposure**
Use internal network scanners to detect any `react-native start` instances bound to 0.0.0.0.
### 6. **Enable Automated Security**
- Turn on `npm audit` in CI/CD
- Use Dependabot or Snyk for dependency monitoring
---
## 🔥 **Why This Is a Big Deal**
- **Target-Rich Environment**: Developer laptops contain **source code, API keys, SSH credentials, and build tools**.
- **Supply Chain Trust**: Maintained by **Meta** — a package trusted by enterprises and indie devs alike.
- **Mass Exposure**: Over **4,600 publicly reachable instances** already identified in internet-wide scans.
- **Silent Risk**: Many devs leave Metro running during long build sessions — perfect for drive-by attacks.
---
## 📢 **Global Awareness (X/Twitter Buzz)**
- **JFrog Security** issued urgent advisory: *"Remote attackers can execute code on your machine via a single HTTP request."*
- **ZoomEye** reported **4,600+ live vulnerable servers** within 24 hours of disclosure.
- Alerts in **Japanese, Persian, Portuguese, and English** — indicating **worldwide scanning activity**.
- Security researchers warn: **"This is the new Log4Shell for mobile devs."**
---
## 🔒 **Final Recommendation**
> **Patch to v20.0.0 TODAY. Bind to localhost. Block port 8081 externally.**
This is **not a theoretical risk** — active exploitation is highly likely due to ease of attack and high value of compromised dev machines.
**Stay safe. Update now.** 🔐
文件快照
[4.0K] /data/pocs/761c733e2457f3df75cac8e09c81e27387db834e
└── [4.6K] README.md
1 directory, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。