It never rains, but it pours: A security bug with a maximum severity rating is putting many of the worlds’ servers at risk

It’s been a grim few months for the world of servers, cloud services, and hyperscalers. With AWS going AWOL in October and Cloudflare doing its best impression of a yo-yo in recent weeks, it would be nice to have some good news to share about that technology sector. Alas, no, as it turns out that a very popular web app framework, used heavily in servers around the world, has been discovered to have a maximum severity security bug.

The software packages in question are React Server Components, and the developers issued a rather alarming statement about a critical security vulnerability earlier this week (via The Register and Wiz).

Specifically, the vulnerability “allows unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints.” Translating this to something more understandable, it basically means somebody can use a remote web request of a server running React JavaScript or a React-based application framework, and ultimately run dodgy code to extract data, override systems, or what have you.

It’s so bad that it has a maximum severity rating on the CVE database. Fortunately, React’s developers created a fix almost immediately, although the somewhat restrained “We recommend upgrading immediately” suggestion might not be enough to prevent anyone from successfully exploiting the vulnerability.

That’s because React, et al is used by vast swathes of the web that everyday folks know about. The Register writes that “Meta’s Facebook and Instagram, Netflix, Airbnb, Shopify, Hello Fresh, Walmart, and Asana rely on it.” If you’re a heavy user of Meta’s apps, you should know that React is developed by it, so I think it’s safe to assume that all its servers have already been patched.

Hacker, IT and person with code on computer, programming and phishing scam with malware or virus.

You can always spot a hacker, as they always wear their hoods up. (Image credit: seksan Mongkhonkhamsao @ Getty Images)

The same can’t be said for everyone else, though, especially if The Register’s statement that an estimated 39% of all cloud environments have the vulnerability is true. Even if it’s nowhere near this amount, it’s still a significant portion of the web that is used on a daily basis, so I wouldn’t be in the least bit surprised if I’m writing about another mass data breach on a server using React at some point in the near future.

There’s a very popular XKCD image that accurately describes the entirety of the interwebs. When it all works, it’s nothing short of a modern miracle, but if one tiny thing goes wrong, then the whole thing comes crashing down. Cloudflare’s big shutdown in November was caused by a configuration file that simply “grew beyond an expected size of entries”, and AWS’ collapse was due to an automation software bug.

In other words, even if every instance of React has been patched within nanoseconds of the vulnerability announcement, there are still plenty more ways for server admins to have yet another very bad day.

Source

About Author