ET WEB_SPECIFIC_APPS Vite RSC React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182)
Here you can find all the details about the rule "ET WEB_SPECIFIC_APPS Vite RSC React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182)". Propose edits, view related rules, and engage with the community through comments.
[[ currentRule.title ]]
[[ currentRule.description ]]
Rule Content
v [[ currentRule.version ]][[ currentRule.to_string ]]
{
"id": 182884,
"format": "suricata",
"title": "ET WEB_SPECIFIC_APPS Vite RSC React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182)",
"license": "GPL-2.0",
"description": "No description provided",
"uuid": "c9392596-850c-4fb0-891d-2722ca3f2fa7",
"original_uuid": "2066028",
"source": "emerging-all.rules.zip by admin admin",
"author": "Unknown",
"creation_date": "2025-12-19 10:26",
"last_modif": "2025-12-19 10:26",
"vote_up": 0,
"vote_down": 0,
"user_id": 1,
"version": "3",
"to_string": "alert http any any -> $HOME_NET any (msg:\"ET WEB_SPECIFIC_APPS Vite RSC React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182)\"; flow:established,to_server; http.header; to_lowercase; content:\"x-rsc-action|3a 20|\"; fast_pattern; http.content_type; content:\"multipart/form-data|3b|\"; http.request_body; content:\"|24 40|\"; pcre:\"/^[0-9a-fA-F]+\\x22?\\x0d\\x0a/R\"; content:\"|22|_prefix|22|\"; content:\"|22|_formData|22|\"; content:\"|22 24|\"; pcre:\"/^[0-9a-fA-F]+\\x3a(?:__proto__|constructor|Module)\\x3a/R\"; http.method; content:\"POST\"; reference:url,github.com/acheong08/CVE-2025-55182-vite-rsc; reference:url,react2shell.com/; reference:cve,2025-55182; classtype:web-application-attack; sid:2066028; rev:3; metadata:affected_product Vite, attack_target Server, tls_state TLSDecrypt, created_at 2025_12_04, cve CVE_2025_55182, deployment Perimeter, deployment Internal, deployment SSLDecrypt, confidence Medium, signature_severity Major, tag Exploit, tag Description_Generated_By_Proofpoint_Nexus, updated_at 2025_12_08, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1190, mitre_technique_name Exploit_Public_Facing_Application; target:dest_ip;)",
"is_favorited": false,
"cve_id": "{CVE-2025-55182}"
}
{
"uuid": "f4c3ef03-e902-49d0-a535-43f21d03dd94",
"Object": [
{
"name": "suricata",
"meta-category": "network",
"template_uuid": "3c177337-fb80-405a-a6c1-1b2ddea8684a",
"description": "An object describing one or more Suricata rule(s) along with version and contextual information.",
"template_version": "2",
"uuid": "a75a45f8-a186-493d-83c9-6cfdb8aa1add",
"Attribute": [
{
"uuid": "b73786fc-3a25-4c7b-8e01-5c4985274fb4",
"object_relation": "suricata",
"value": "alert http any any -> $HOME_NET any (msg:\"ET WEB_SPECIFIC_APPS Vite RSC React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182)\"; flow:established,to_server; http.header; to_lowercase; content:\"x-rsc-action|3a 20|\"; fast_pattern; http.content_type; content:\"multipart/form-data|3b|\"; http.request_body; content:\"|24 40|\"; pcre:\"/^[0-9a-fA-F]+\\x22?\\x0d\\x0a/R\"; content:\"|22|_prefix|22|\"; content:\"|22|_formData|22|\"; content:\"|22 24|\"; pcre:\"/^[0-9a-fA-F]+\\x3a(?:__proto__|constructor|Module)\\x3a/R\"; http.method; content:\"POST\"; reference:url,github.com/acheong08/CVE-2025-55182-vite-rsc; reference:url,react2shell.com/; reference:cve,2025-55182; classtype:web-application-attack; sid:2066028; rev:3; metadata:affected_product Vite, attack_target Server, tls_state TLSDecrypt, created_at 2025_12_04, cve CVE_2025_55182, deployment Perimeter, deployment Internal, deployment SSLDecrypt, confidence Medium, signature_severity Major, tag Exploit, tag Description_Generated_By_Proofpoint_Nexus, updated_at 2025_12_08, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1190, mitre_technique_name Exploit_Public_Facing_Application; target:dest_ip;)",
"type": "snort",
"disable_correlation": false,
"to_ids": true,
"category": "Network activity"
},
{
"uuid": "f579fa35-4d30-456c-9a91-c5fa1c2a1623",
"object_relation": "suricata-rule-name",
"value": "ET WEB_SPECIFIC_APPS Vite RSC React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182)",
"type": "text",
"disable_correlation": false,
"to_ids": false,
"category": "Other"
},
{
"uuid": "46f8ee3a-e8c4-412a-9e32-349834d88099",
"object_relation": "comment",
"value": "No description provided",
"type": "comment",
"disable_correlation": false,
"to_ids": false,
"category": "Other"
},
{
"uuid": "b76f8958-9745-4c2d-be92-29592860097c",
"object_relation": "version",
"value": "3",
"type": "text",
"disable_correlation": false,
"to_ids": false,
"category": "Other"
},
{
"uuid": "6b4ac72d-1117-42b8-85c4-160c856cb95e",
"object_relation": "reference",
"value": "emerging-all.rules.zip by admin admin",
"type": "link",
"disable_correlation": false,
"to_ids": false,
"category": "External analysis"
}
],
"distribution": "5",
"sharing_group_id": "0"
}
]
}
Similar Rules
More RulesThe similarity is calculated using the TF-IDF (Term Frequency - Inverse Document Frequency) vectorization of each rule's text, followed by computing the cosine similarity between vectors.
This method compares the textual content of the rules, giving higher weight to distinctive terms and lower weight to common terms. It is robust to small changes in wording.
Learn more on the official scikit-learn documentation: TF-IDF Vectorizer & Cosine Similarity
[[ rule.title ]]
[[ rule.description ]]
Related Bundles
[[ bundleListRule.length ]] TotalNo bundles found for this rule.
Please log in to propose an edit.
No edit proposals found for this rule.
[[ comments_list.length ]] Comments
Join the conversation
Login to replyCommunity Discussion
No comments yet
Be the first to share your thoughts on this rule!