Questions tagged [shellshock]

Shellshock is a series of security vulnerabilities in bash, starting with (CVE-2014-6271) which allows arbitrary code execution from environment variables.

Shellshock is vulnerability CVE-2014-6271 in bash (other shells are not affected), reported by Stéphane Chazelas in September 2014.

Bash imports function definitions from the environment when it starts; the vulnerability is due to executing arbitrary code from specially-crafted environment variables.

Common remote execution vectors include CGI scripts, OpenSSH forced commands, and some DHCP servers. Local execution vectors include bash scripts executed with elevated privileges or with environment values obtained from untrusted sources; sudo is not affected because it filters out environment entries that look like bash exported functions.

In the wake of the initial discovery, several more vulnerabilities were discovered in the same part of the bash code.

To fix these vulnerabilities, upgrade bash to a version that fixes CVE-2014-6271 and other vulnerabilities. Apply your distribution's security updates as usual. For the rare users who install bash from source, patches have been provided for all affected versions.

80 questions
15
votes
3 answers

What is "tmUnblock.cgi" and can it be exploited by Shellshock? (Linux / Apache webserver)

I found what looks like a possible attempted Shellshock attack targeting tmUnblock.cgi, and I'm trying to understand it. I was checking through Apache access logs for a small webserver during the time period between the Shellshock bug becoming news…
11
votes
2 answers

What operating systems and devices are known to be affected by Shellshock? What patches are available?

This is intended to be a Community Wiki to document which operating systems and devices are known to be affected by the Shellshock vulnerability (and related vulnerabilities), and what patches are available. The CW list should contain the following…
Iszi
  • 27,127
  • 18
  • 101
  • 163
4
votes
2 answers

Does gitolite provide an attack vector for the shellshock vulnerability?

On the gitolite documentation page it says the following: "Before running the command, however, sshd sets up an environment variable called SSH_ORIGINAL_COMMAND which contains the actual git command that your workstation sent out. This is the…
samy
  • 143
  • 4
3
votes
1 answer

How to tell if someone else's site is vulnerable to Shellshock without hacking them?

Registration card in hand, I went to register a newly purchased power tool yesterday. But when I arrived at the manufacturer's site, I was greeted by an ancient homegrown interface that was marked "Copyright (C) 2004" and looked like HTML 1.0. …
John Deters
  • 34,205
  • 3
  • 61
  • 113
3
votes
2 answers

Is there evidence of Shellshock being exploited before its public announcement?

The Shellshock vulnerability was about 25 years old when it was publicly announced. Has there been any evidence of it being exploited in the wild before its "official" public announcement?
André Borie
  • 12,826
  • 3
  • 42
  • 76
3
votes
2 answers

Are there any remote sites available to apply shellshock on?

I'm a grad student. We're looking for a remote site to perform shellshock for educational purposes. Sites which are willingly vulnerable for ethical hacking purposes??
shezi27
  • 63
  • 4
0
votes
1 answer

Shellshock used in CUPS

Some days ago I read about the Shellshock bug and I wanted to test a CUPS server for it and readed some example codes to build this code: () { test;};echo /"Content-type: text/plain\"; echo; echo; /bin/cat /etc/passwd'…
0
votes
0 answers

Where can I find a list indicating the vulnerability status of SOHO routers to Shellshock?

I tried to Google this but information is very scant ATM. Is there anyone compiling a list with a specific focus on SOHO routers?
Peter Stuer
  • 101
  • 1
-1
votes
1 answer

Shellshock Exploit

I want to know about "Shellshock bug" and therefore I would like to ask some questions: Is this bug still a real threat today (in 2016)? What damage can be done using this exploit? How many systems could be affected by this? How exactly the attack…