Skip to content

Commit eaf4e9e

Browse files
updated BBR
1 parent aeaa6ee commit eaf4e9e

File tree

2 files changed

+11
-10
lines changed

2 files changed

+11
-10
lines changed

rules/network/initial_access_react_server_components_rce_attempt.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ description = """
1010
This rule detects exploitation attempts targeting CVE-2025-55182, a critical remote code execution vulnerability in
1111
React Server Components (RSC) Flight protocol. The vulnerability allows attackers to execute arbitrary code on the
1212
server by sending specially crafted deserialization payloads that exploit prototype chain traversal to access the
13-
Function constructor. This rule focuses on high-fidelity indicators of active exploitation including successful
14-
command execution responses and prototype pollution attack patterns.
13+
Function constructor. This rule focuses on high-fidelity indicators of active exploitation including successful command
14+
execution responses and prototype pollution attack patterns.
1515
"""
1616
from = "now-9m"
1717
index = ["logs-network_traffic.http*"]
@@ -51,7 +51,7 @@ references = [
5151
"https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182",
5252
"https://github.com/assetnote/react2shell-scanner",
5353
"https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/",
54-
"https://github.com/msanft/CVE-2025-55182"
54+
"https://github.com/msanft/CVE-2025-55182",
5555
]
5656
risk_score = 73
5757
rule_id = "a8f7e9d4-3b2c-4d5e-8f1a-6c9b0e2d4a7f"

rules_building_block/initial_access_anomalous_rsc_flight_data_patterns.toml

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ building_block_type = "default"
1010
description = """
1111
This rule detects anomalous patterns in React Server Components (RSC) Flight protocol data streams that may indicate
1212
code injection or exploitation attempts. The Flight protocol is used by React and Next.js for server-client
13-
communication, and should never contain Node.js code execution primitives like child_process, fs module calls, or
14-
eval patterns. This building block rule casts a wider net to identify suspicious payloads that warrant further
15-
investigation.
13+
communication, and should never contain Node.js code execution primitives like child_process, fs module calls, or eval
14+
patterns. This building block rule casts a wider net to identify suspicious payloads that warrant further investigation.
1615
"""
17-
from = "now-9m"
16+
from = "now-119m"
1817
index = ["logs-network_traffic.http*"]
18+
interval = "60m"
1919
language = "eql"
2020
license = "Elastic License v2"
2121
name = "Anomalous React Server Components Flight Data Patterns"
@@ -25,7 +25,7 @@ references = [
2525
"https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182",
2626
"https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/",
2727
"https://nextjs.org/docs/app/building-your-application/rendering/server-components",
28-
"https://tonyalicea.dev/blog/understanding-react-server-components/"
28+
"https://tonyalicea.dev/blog/understanding-react-server-components/",
2929
]
3030
risk_score = 21
3131
rule_id = "b9c8d7e6-5a4f-3c2b-1d0e-9f8a7b6c5d4e"
@@ -44,7 +44,7 @@ timestamp_override = "event.ingested"
4444
type = "eql"
4545

4646
query = '''
47-
network where http.request.method == "POST" and http.response.status_code != 200
47+
network where http.request.method == "POST" and http.response.status_code != 200 and
4848
(
4949
// Node.js child_process module
5050
(
@@ -97,7 +97,6 @@ reference = "https://attack.mitre.org/techniques/T1190/"
9797
id = "TA0001"
9898
name = "Initial Access"
9999
reference = "https://attack.mitre.org/tactics/TA0001/"
100-
101100
[[rule.threat]]
102101
framework = "MITRE ATT&CK"
103102
[[rule.threat.technique]]
@@ -110,7 +109,9 @@ name = "JavaScript"
110109
reference = "https://attack.mitre.org/techniques/T1059/007/"
111110

112111

112+
113113
[rule.threat.tactic]
114114
id = "TA0002"
115115
name = "Execution"
116116
reference = "https://attack.mitre.org/tactics/TA0002/"
117+

0 commit comments

Comments
 (0)