POC详情: 64208862f4f0070bdf5738702407a53ff75cc716

来源
关联漏洞
标题: GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
描述:GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceComman
描述
Shellshock exploit (CVE-2014-6271)
介绍
# Shellshock Exploit (CVE-2014-6271)

#### Exploit
## <u>Description</u>
This repository contains an exploit for a vulnerability that affects unix-based systems. Please note that this is merely a proof-of-concept script created for educational purposes and should be used responsibly.

This exploit is designed to demonstrate how the shellshock attack works and how it could be used to gain shell access to a system through a maliciously crafted request header.

### <u>Disclaimer</u>
This repository is intended for educational purposes only. Do not use this code or any information contained within for malicious purposes. Always follow ethical guidelines and respect the law.


Usage:

	python3 shellshock.py [Vulnerable URL] [LHOST] [LPORT]
Example:

	python3 shellshock.py http://vulnerablewebsite.com/cgi-bin/test.cgi 109.876.654.321 1234


Prerequisites:
- A local development environment
- Python installed

### <u>To run this exploit, you can follow these steps:</u>
Clone this repository to your local machine.
```
git clone https://github.com/AlissonFaoli/Shellshock.git
```

Navigate to the project directory.
```
cd Shellshock
```

Run the shellshock.py script.
```
python3 shellshock.py http://vulnerable-website.com/cgi-bin/test.cgi listening_interface_IP listening_port
```

###### Please remember that this exploit should never be used against real software or systems you're not authorized to test. Unauthorized access or any malicious activity is illegal.

#### <u>License</u>
_This exploit is released under the MIT License. You can find more information about this in the LICENSE file._


# Author: Alisson Faoli

#### Github: https://github.com/AlissonFaoli
#### LinkedIn: https://linkedin.com/in/alisson-faoli



<b>If you have any questions or concerns about this exploit, please feel free to contact the author</b>
文件快照

[4.0K] /data/pocs/64208862f4f0070bdf5738702407a53ff75cc716 ├── [1.0K] LICENSE ├── [1.8K] README.md └── [2.8K] shellshock.py 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。