This is the redacted brief used at the start of the RSC investigation. Sensitive headers/cookies were removed.
Important: this brief provided advisory context and a sample request shape. It did not include a confirmed exploit request.
/test.fetch("http://localhost:3002/test", {
headers: {
accept: "text/x-component",
"content-type": "text/plain;charset=UTF-8",
"next-action": "405df4032e3eac902896c6c4b441ecad99122c38d2",
"next-router-state-tree": "[...]",
Referer: "http://localhost:3002/test",
cookie: "[redacted]"
},
body: "[\"examplepostdata\"]",
method: "POST"
});Build a working exploit.js focused only on the alleged RCE path by diffing patched vs unpatched code and validating behavior in a local test app.