Skip to main content

Module react

Module react 

Source
Available on crate feature react2shell only.
Expand description

§React2Shell — CVE-2025-55182 Scanner, Attacker & Report Generator

Enterprise-grade React Server Components vulnerability toolkit.

This module provides a complete Rust implementation of the React2Shell toolchain:

§Scanner

  • Static JS bundle analysis (React & Next.js version detection)
  • RSC/Server Action endpoint discovery
  • HTTP header analysis for framework fingerprinting
  • Sensitive file fuzzing (.env, .git/config, etc.)
  • Secret/API key pattern detection in JS bundles
  • Vulnerability evaluation against known-vulnerable version lists

§Attacker

  • Phase 1 — Reconnaissance: Technology stack fingerprinting & version extraction
  • Phase 2 — Source Leak (CVE-2025-55183): Flight protocol source code exfiltration
  • Phase 3 — DoS (CVE-2025-55184): Memory/CPU exhaustion via self-referencing payloads
  • Phase 4 — RCE (CVE-2025-55182): Remote code execution via blob handler exploitation
  • Phase 5 — Full Chain: Orchestrated multi-phase attack with optional Tor proxying

§Report Generator

  • Structured JSON reports for all scan/attack phases
  • Colored console output with severity indicators
  • Aggregate attack report combining all phases

Structs§

AttackPhaseResult
Result of a single attack phase.
AttackReport
Aggregate attack report combining scan + attack results.
DependencyInfo
A discovered software dependency with version.
DosResult
DoS test result.
ExposedFile
An exposed sensitive file discovered during fuzzing.
FullChainResult
Combined full-chain attack result.
RceCommandOutput
Output from a single RCE command execution.
RceResult
RCE execution result.
React2ShellScanner
React2Shell vulnerability scanner for detecting CVE-2025-55182.
ReconResult
Reconnaissance phase result.
ReportSummary
RscEndpoint
A discovered RSC/Server Action endpoint.
ScanResult
Full results from a React2Shell vulnerability scan.
SecretInfo
A detected secret/credential.
SourceLeakFinding
A finding from source code leak analysis.
SourceLeakResult
Source leak attack result.
VersionInfo
Version information detected from a source.

Functions§

build_rce_payload
Build an RCE payload for the Flight protocol.
craft_leak_payload
Craft a Flight-format source leak payload.
execute_dos
Execute the DoS attack against the target.
execute_rce
Execute the full RCE attack phase (recon cmds + PoC file creation).
execute_rce_command
Execute a command via RCE (demo/educational mode).
execute_source_leak
Execute the source leak attack against a target.
extract_sensitive_data
Extract sensitive data from leaked source code using regex patterns.
generate_report
Generate a structured JSON report combining scan and attack results.
is_nextjs_vulnerable
Check if a Next.js version is in the known-vulnerable list.
is_react_vulnerable
Check if a React version is in the known-vulnerable list.
measure_baseline
Measure baseline response time for the target.
print_dos_result
Print a DoS result to console.
print_full_chain_result
Print a full-chain attack result to console.
print_rce_result
Print an RCE result to console.
print_recon_result
Print a reconnaissance result to console.
print_scan_result
Print a scan result to the console with ANSI colors.
print_source_leak_result
Print a source leak result to console.
report_to_json
Serialize a report to a JSON string.
run_full_chain
Run the full attack chain (Recon → Source Leak → DoS → RCE) against a target.
run_recon
Reconnaissance attack — technology stack fingerprinting.
save_report
Save a report to a JSON file.
scan_and_attack
Run the full attack chain (scan + all phases) and generate a report.
scan_and_report
Run a full vulnerability scan and generate a console report.
test_memory_exhaustion
Test memory exhaustion via self-referencing DoS payload.