Skip to content

Commit 5b2c662

Browse files
authored
Update nextjs.md
1 parent b69e25d commit 5b2c662

File tree

1 file changed

+2
-2
lines changed
  • src/network-services-pentesting/pentesting-web

1 file changed

+2
-2
lines changed

src/network-services-pentesting/pentesting-web/nextjs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1382,9 +1382,9 @@ rg -n "'use server';" -g"*.{js,ts,jsx,tsx}" app/
13821382
- **Next.js stable:** App Router releases 15.0.0–16.0.6 embed the vulnerable RSC stack. Patch trains 15.0.5 / 15.1.9 / 15.2.6 / 15.3.6 / 15.4.8 / 15.5.7 / 16.0.7 include fixed deps, so any build below those versions is high-value.
13831383
- **Next.js canary:** `14.3.0-canary.77+` also ships the buggy runtime and currently lacks patched canary drops, making those fingerprints strong exploitation candidates.
13841384

1385-
#### Remote detection oracle (react2shell-scanner)
1385+
#### Remote detection oracle
13861386

1387-
Until a full exploit is public, detection is mostly protocol-based. Assetnote’s [`react2shell-scanner`](https://github.com/assetnote/react2shell-scanner) sends a crafted multipart Flight request to candidate paths and watches server-side behavior:
1387+
Assetnote’s [`react2shell-scanner`](https://github.com/assetnote/react2shell-scanner) sends a crafted multipart Flight request to candidate paths and watches server-side behavior:
13881388

13891389
- **Default mode** executes a deterministic RCE payload (math operation reflected via `X-Action-Redirect`) proving code execution.
13901390
- **`--safe-check` mode** purposefully malforms the Flight message so patched servers return `200/400`, while vulnerable targets emit `HTTP/500` responses containing the `E{"digest"` substring inside the body. That `(500 + digest)` pair is currently the most reliable remote oracle published by defenders.

0 commit comments

Comments
 (0)