Skip to content

rix4uni/react2shell-scanner

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 

Repository files navigation

react2shell-scanner

A command-line tool for detecting CVE-2025-55182 and CVE-2025-66478 in Next.js applications using React Server Components.

For technical details on the vulnerability and detection methodology, see our blog post: https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478

How It Works

By default, the scanner sends a crafted multipart POST request containing an RCE proof-of-concept payload that executes a deterministic math operation (41*271 = 11111). Vulnerable hosts return the result in the X-Action-Redirect response header as /login?a=11111.

The scanner tests the root path (/) by default. Use --path or --path-file to test custom paths. If not vulnerable, it follows same-host redirects (e.g., / to /en/) and tests the redirect destination. Cross-origin redirects are not followed.

Safe Check Mode

The --safe-check flag uses an alternative detection method that relies on side-channel indicators (500 status code with specific error digest) without executing code on the target. Use this mode when RCE execution is not desired.

WAF Bypass

The --waf-bypass flag prepends random junk data to the multipart request body. This can help evade WAF content inspection that only analyzes the first portion of request bodies. The default size is 128KB, configurable via --waf-bypass-size. When WAF bypass is enabled, the timeout is automatically increased to 20 seconds (unless explicitly set).

Vercel WAF Bypass

The --vercel-waf-bypass flag uses an alternative payload variant specifically designed to bypass Vercel WAF protections. This uses a different multipart structure with an additional form field.

Windows Mode

The --windows flag switches the payload from Unix shell (echo $((41*271))) to PowerShell (powershell -c "41*271") for targets running on Windows.

Resume Functionality

When scanning from a list file, the scanner automatically enables resume functionality. Progress is saved after each host is scanned to a resume file (.resume extension) in statistics format:

total=500000
scanned=300000
pending=200000

If a scan is interrupted (including via CTRL+C), you can resume by running the same command again. The scanner will automatically skip already-scanned hosts and continue from where it left off.

The resume file is automatically cleaned up after successful completion. Use --no-resume to disable resume functionality and start from scratch.

Interrupt Handling

The scanner responds immediately to CTRL+C on the first press:

  • Pending tasks are cancelled gracefully
  • Resume statistics are saved before exiting
  • A helpful message is shown indicating how to resume the scan

Requirements

  • Python 3.9+
  • requests
  • tqdm

Installation

pip install -r requirements.txt

Usage

Scan a single host:

python3 scanner.py -u https://example.com

Scan a list of hosts:

python3 scanner.py -l hosts.txt

Scan with multiple threads and save results:

python3 scanner.py -l hosts.txt -t 20 -o results.json

Scan with custom headers:

python3 scanner.py -u https://example.com -H "Authorization: Bearer token" -H "Cookie: session=abc"

Use safe side-channel detection:

python3 scanner.py -u https://example.com --safe-check

Scan Windows targets:

python3 scanner.py -u https://example.com --windows

Scan with WAF bypass:

python3 scanner.py -u https://example.com --waf-bypass

Scan custom paths:

python3 scanner.py -u https://example.com --path /_next
python3 scanner.py -u https://example.com --path /_next --path /api
python3 scanner.py -u https://example.com --path-file paths.txt

Save vulnerable URLs to a file (one per line):

python3 scanner.py -l hosts.txt --final-urls-file results.txt

When using --final-urls-file, terminal output shows only the final_url values (one per line) instead of full [VULNERABLE] messages. The progress bar stays at the bottom and updates in place.

Resume a scan after interruption:

python3 scanner.py -l hosts.txt
# Press CTRL+C to interrupt
# Later, run the same command to resume from where you left off

The scanner automatically saves progress after each host is scanned. If interrupted, you can resume by running the same command again. Use --no-resume to start from scratch.

Options

-u, --url         Single URL to check
-l, --list        File containing hosts (one per line)
-t, --threads     Number of concurrent threads (default: 10)
--timeout         Request timeout in seconds (default: 10)
-o, --output      Output file for results (JSON)
--all-results     Save all results, not just vulnerable hosts
--final-urls-file File to save unique final_url values (one per line)
--no-resume       Disable resume functionality and start from scratch
-k, --insecure    Disable SSL certificate verification
-H, --header      Custom header (can be used multiple times)
-v, --verbose     Show response details for vulnerable hosts
-q, --quiet       Only output vulnerable hosts
--no-color        Disable colored output
--safe-check      Use safe side-channel detection instead of RCE PoC
--windows         Use Windows PowerShell payload instead of Unix shell
--waf-bypass      Add junk data to bypass WAF content inspection
--waf-bypass-size Size of junk data in KB (default: 128)
--vercel-waf-bypass Use Vercel WAF bypass payload variant
--path            Custom path to test (can be used multiple times)
--path-file       File containing paths to test (one per line)

Credits

The RCE PoC was originally disclosed by @maple3142 -- we are incredibly grateful for their work in publishing a working PoC.

This tooling originally was built out as a safe way to detect the RCE. This functionality is still available via --safe-check, the "safe detection" mode.

Output

Results are printed to the terminal. By default, vulnerable hosts are displayed with [VULNERABLE] status messages. When using --final-urls-file, the output format changes to show only the final_url values (one per line) above a single progress bar that updates in place:

medisway.com
media115.lanestel.fr
maximaleinsatz.marketing
maps.icgracia.org
Scanning:  17%|█████▎                          | 5/30 [00:01<00:04,  6.10host/s]

When using -o, vulnerable hosts are saved to a JSON file containing the full HTTP request and response for verification.

Resume Files

When scanning from a list file, progress is automatically saved to a resume file (same name as the input file with .resume extension). The resume file uses a statistics-based format:

total=500000
scanned=300000
pending=200000

To resume an interrupted scan, simply run the same command again. The scanner will automatically detect the resume file and continue from where it left off. The resume file is automatically deleted after successful completion.

About

High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%