关联漏洞
标题:
GNU Bash 远程代码执行漏洞
(CVE-2014-6271)
描述:GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceComman
描述
Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271
介绍
bash-CVE-2014-6271 Cookbook
===========================
This Chef cookbook contains a default recipe that will fail
your Chef run if a bash is found and that bash is vulnerable
to the remote exploit described in CVE-2014-6271. The places
to look for `bash` can be configured in the
`node['bash-CVE-2014-6271']['bashes']` attribute (see below)
Requirements
------------
Should work on any UNIX/Linux. Please report problems (ideally with patches)
Attributes
----------
* `node['bash-CVE-2014-6271']['bashes']` - A required array of possible bash executables to test for the vulnerability. Defaults to `/bin/bash` and `/usr/local/bin/bash`
Usage
-----
#### bash-CVE-2014-6271::default
Just include `bash-CVE-2014-6271` in your node's `run_list`:
```json
{
"name":"my_node",
"run_list": [
"recipe[bash-CVE-2014-6271]"
]
}
```
Contributing
------------
1. Fork the repository on Github
2. Create a named feature branch (like `add_component_x`)
3. Write your change
4. Write tests for your change (if applicable)
5. Run the tests, ensuring they all pass
6. Submit a Pull Request using Github
License and Authors
-------------------
- Author:: Jeff Blaine (<jblaine@kickflop.net>)
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
文件快照
[4.0K] /data/pocs/6608757e471bb418e38c091bef2b420e14255777
├── [4.0K] attributes
│ └── [ 138] default.rb
├── [ 216] CHANGELOG.md
├── [ 11K] LICENSE
├── [ 566] metadata.rb
├── [1.7K] README.md
└── [4.0K] recipes
└── [1.1K] default.rb
2 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。