Shellshock vulnerability reverse shell### Poc exploit(bash script)<br>
[shell.webm](https://github.com/0xTabun/CVE-2014-6271/assets/144548207/16297451-8124-4211-8b1b-18461cdbeb4d)
### About the exploit<br>
You can get reverse shell with .sh file (in Linux)<br>
You can get reverse shell with .py file in (Windows and Linux) (in windows, you need to install netcat)<br>
You must specify the full url with file<br>
example: http://target/cgi-bin/vulnerable.sh<br>
* using for .py:<br>
python shellshock.py<br>
* using for .sh:<br>
chmod +x shellshock.sh<br>
./shellshock.sh<br>
##### Exploit Title: CVE-2014-6271 | Reverse shell<br>
***Author: Tabun***
[4.0K] /data/pocs/4b082a57ddaf6c40ec768d8f8a4d25acd53a93c5
├── [ 618] README.md
├── [ 598] readme.txt
├── [1.0K] shellshock.py
└── [1.0K] shellshock.sh
0 directories, 4 files