Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2014-6271
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GNU Bash 远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceComman
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2014-6271
#POC DescriptionSource LinkShenlong Link
1Collected fixes for bash CVE-2014-6271https://github.com/dlitz/bash-cve-2014-6271-fixesPOC Details
2Patch for CVE-2014-6271https://github.com/npm/ansible-bashpocalypsePOC Details
3patched-bash-4.3 for CVE-2014-6271https://github.com/ryancnelson/patched-bash-4.3POC Details
4Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271https://github.com/jblaine/cookbook-bash-CVE-2014-6271POC Details
5Nonehttps://github.com/rrreeeyyy/cve-2014-6271-specPOC Details
6Python Scanner for "ShellShock" (CVE-2014-6271)https://github.com/scottjpack/shellshock_scannerPOC Details
7Written fro CVE-2014-6271https://github.com/Anklebiter87/Cgi-bin_bash_ReversePOC Details
8a auto script to fix CVE-2014-6271 bash vulnerabilityhttps://github.com/justzx2011/bash-upPOC Details
9Nonehttps://github.com/mattclegg/CVE-2014-6271POC Details
10Quick and dirty nessus .audit file to check is bash is vulnerable to CVE-2014-6271https://github.com/ilismal/Nessus_CVE-2014-6271_checkPOC Details
11CVE-2014-6271 RCE tool https://github.com/RainMak3r/RainstormPOC Details
12Simple script to check for CVE-2014-6271https://github.com/gabemarshall/shocknawwPOC Details
13Nonehttps://github.com/woltage/CVE-2014-6271POC Details
14CVE-2014-6271の検証用Vagrantfileですhttps://github.com/ariarijp/vagrant-shellshockPOC Details
15scripts associate with bourne shell EVN function parsing vulnerability CVE-2014-6271https://github.com/themson/shellshockPOC Details
16CVE-2014-6271 (ShellShock) RCE PoC tool https://github.com/securusglobal/BadBashPOC Details
17scaner for cve-2014-6271https://github.com/villadora/CVE-2014-6271POC Details
18Salt recipe for shellshock (CVE-2014-6271)https://github.com/APSL/salt-shellshockPOC Details
19Ansible role to check the CVE-2014-6271 vulnerabilityhttps://github.com/teedeedubya/bash-fix-exploitPOC Details
20Debian Lenny Bash packages with cve-2014-6271 patches (i386 and amd64)https://github.com/internero/debian-lenny-bash_3.2.52-cve-2014-6271POC Details
21Nonehttps://github.com/u20024804/bash-3.2-fixed-CVE-2014-6271POC Details
22Nonehttps://github.com/u20024804/bash-4.2-fixed-CVE-2014-6271POC Details
23Nonehttps://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271POC Details
24A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific serverhttps://github.com/francisck/shellshock-cgiPOC Details
25A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug)https://github.com/proclnas/ShellShock-CGI-ScanPOC Details
26CVE-2014-6271 Remote Interactive Shell - PoC Exploithttps://github.com/sch3m4/RISPOC Details
27Nonehttps://github.com/ryeyao/CVE-2014-6271_TestPOC Details
28shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGIhttps://github.com/cj1324/CGIShellPOC Details
29This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possiblehttps://github.com/renanvicente/puppet-shellshockPOC Details
30Android app to scan for bash Vulnerability - CVE-2014-6271 also known as Shellshockhttps://github.com/indiandragon/Shellshock-Vulnerability-ScanPOC Details
31:scream: Python library and utility for CVE-2014-6271 (aka. "shellshock")https://github.com/ramnes/pyshellshockPOC Details
32This is a Python Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271https://github.com/akiraaisha/shellshocker-pythonPOC Details
33Using google to scan sites for "ShellShock" (CVE-2014-6271)https://github.com/352926/shellshock_crawlerPOC Details
34system reading coursehttps://github.com/kelleykong/cve-2014-6271-mengjia-kongPOC Details
35reading coursehttps://github.com/huanlu/cve-2014-6271-huan-luPOC Details
36This is an Android Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271https://github.com/sunnyjiang/shellshocker-androidPOC Details
37A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug).https://github.com/P0cL4bs/ShellShock-CGI-ScanPOC Details
38Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshockhttps://github.com/hmlio/vaas-cve-2014-6271POC Details
39Shellshock exploit + vulnerable environmenthttps://github.com/opsxcq/exploit-CVE-2014-6271POC Details
40Nonehttps://github.com/Pilou-Pilou/docker_CVE-2014-6271.POC Details
41Shellshock POC | CVE-2014-6271 | cgi-bin reverse shellhttps://github.com/zalalov/CVE-2014-6271POC Details
42A simple python shell-like exploit for the Shellschok CVE-2014-6271 bug.https://github.com/heikipikker/shellshock-shellPOC Details
43Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.https://github.com/0x00-0x00/CVE-2014-6271POC Details
44CS4238 Computer Security Practiceshttps://github.com/kowshik-sundararajan/CVE-2014-6271POC Details
45Shellshock vulnerability attackerhttps://github.com/w4fz5uck5/ShockZaum-CVE-2014-6271POC Details
46Nonehttps://github.com/Aruthw/CVE-2014-6271POC Details
47cve-2014-6271https://github.com/cved-sources/cve-2014-6271POC Details
48Nonehttps://github.com/shawntns/exploit-CVE-2014-6271POC Details
49Nonehttps://github.com/Sindadziy/cve-2014-6271POC Details
50cve-2014-6271https://github.com/wenyu1999/bash-shellshockPOC Details
51Nonehttps://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271POC Details
52Nonehttps://github.com/Any3ite/CVE-2014-6271POC Details
53*CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul ---https://github.com/somhm-solutions/Shell-ShockPOC Details
54This is an individual assignment for secure network programminghttps://github.com/rashmikadileeshara/CVE-2014-6271-Shellshock-POC Details
55Nonehttps://github.com/Dilith006/CVE-2014-6271POC Details
56Nonehttps://github.com/cyberharsh/Shellbash-CVE-2014-6271POC Details
57Nonehttps://github.com/MuirlandOracle/CVE-2014-6271-IPFirePOC Details
58This Repo is PoC environment of CVE-2014-6271(https://nvd.nist.gov/vuln/detail/cve-2014-6271).https://github.com/mochizuki875/CVE-2014-6271-Apache-DebianPOC Details
59Shellshock exploit aka CVE-2014-6271https://github.com/b4keSn4ke/CVE-2014-6271POC Details
60CVE-2014-6271 Shellshockhttps://github.com/hadrian3689/shellshockPOC Details
61ShellShock interactive-shell exploithttps://github.com/akr3ch/CVE-2014-6271POC Details
62Nonehttps://github.com/0xConstant/CVE-2014-6271POC Details
63[Python/Shell] - Tested in HackTheBox - Shocker (Easy) CVE-2014-6271https://github.com/Gurguii/cgi-bin-shellshockPOC Details
64A docker container vulnerable to Shellshock - CVE-2014-6271https://github.com/anujbhan/shellshock-victim-hostPOC Details
65[CVE-2014-6271] Apache Shellshock Remote Command Injection tool for quick reverse shell and file browsinghttps://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-POC Details
66Nonehttps://github.com/mritunjay-k/CVE-2014-6271POC Details
67Nonehttps://github.com/Brandaoo/CVE-2014-6271POC Details
68Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgihttps://github.com/Jsmoreira02/CVE-2014-6271POC Details
69Nonehttps://github.com/hanmin0512/CVE-2014-6271_pwnablePOC Details
70Shellshock vulnerability reverse shellhttps://github.com/0xTabun/CVE-2014-6271POC Details
71EXPLOIT FOR CVE-2014-6271https://github.com/0xN7y/CVE-2014-6271POC Details
72The Shellshock Exploit is a tool designed to efficiently exploit the Shellshock vulnerability (CVE-2014-6271) in susceptible CGI servers, enabling a precise takeover of the target server. Shellshock is a critical security vulnerability that affects the Bash shell, allowing attackers to execute arbitrary commands on the targeted systemhttps://github.com/MY7H404/CVE-2014-6271-ShellshockPOC Details
73Shellshock exploit (CVE-2014-6271)https://github.com/AlissoftCodes/ShellshockPOC Details
74Python3 Shellshock (CVE-2014-6271) Scannerhttps://github.com/hackintoanetwork/shellshockPOC Details
75Shellshock exploit (CVE-2014-6271)https://github.com/AlissonFaoli/ShellshockPOC Details
76Shelly is a lightweight and efficient vulnerability scanner designed to identify and mitigate Shellshock (CVE-2014-6271 & CVE-2014-7169) vulnerabilities in Bash environments.https://github.com/ajansha/shellshockPOC Details
77A PoC exploit for CVE-2014-6271 - Shellshockhttps://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOITPOC Details
78Exploit para abusar de la vulnerabilidad Shellshock (CVE-2014-6271).https://github.com/TheRealCiscoo/Shellshock-ExploitPOC Details
79Nonehttps://github.com/RadYio/CVE-2014-6271POC Details
80Nonehttps://github.com/banomaly/CVE-2014-6271POC Details
81Vulnerability Exploitationhttps://github.com/YunchoHang/CVE-2014-6271-SHELLSHOCKPOC Details
82GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ShellShock.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-6271.yamlPOC Details
83Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Shellshock%20%E7%A0%B4%E5%A3%B3%E6%BC%8F%E6%B4%9E%20CVE-2014-6271.mdPOC Details
84Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/bash-cve-2014-6271.ymlPOC Details
85https://github.com/vulhub/vulhub/blob/master/bash/CVE-2014-6271/README.mdPOC Details
86Nonehttps://github.com/Isidoro4-kor/bash-CVE-2014-6271POC Details
87Shellshock Vulnerability Scannerhttps://github.com/moften/CVE-2014-6271POC Details
88CVE-2014-6271(RCE) poc Exploithttps://github.com/knightc0de/Shellshock_vuln_ExploitPOC Details
89This is my implementation of shellshock exploithttps://github.com/rsherstnev/CVE-2014-6271POC Details
90Nonehttps://github.com/RAJMadhusankha/Shellshock-CVE-2014-6271-Exploitation-and-AnalysisPOC Details
91Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgihttps://github.com/J0hnTh3Kn1ght/CVE-2014-6271POC Details
92A complete, modern demonstration lab for CVE-2014-6271 (Shellshock), including architecture, exploitation steps, Burp Suite usage, reverse shells, countermeasures, and full command cheat-sheet.https://github.com/DrHaitham/CVE-2014-6271-Shellshock-POC Details
93Recreating Shellshock (CVE-2014-6271) - the bash vulnerability that endangered millions of servers. Automated exploitation toolkit + Burp Suite methodology + Docker lab. Built for security research & education. Offensive security portfolio project.https://github.com/mtaha-sec/bash-apocalypsePOC Details
94Nonehttps://github.com/andres101c/Shellshock-CVE-2014-6271POC Details
95CVE-2014-6271 Shellshockhttps://github.com/Industri4l-H3ll-Xpl0it3rs/CVE-2014-6271-ShellshockPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2014-6271
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2014-6271

No comments yet


Leave a comment