Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceComman
Readme
# CVE-2014-6271
A vulnerability known as "ShellShock" exists in GNU Bash through 4.3 due to how it processes trailing strings in the values of environment variables after function definitions. This vulnerability enables remote attackers to execute arbitrary code by crafting the environment in certain situations, including when the environment is set across a privilege boundary from Bash execution. The vulnerability has been demonstrated in various scenarios, such as the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, and scripts executed by unspecified DHCP clients. It should be noted that the original fix for this vulnerability was incorrect, and a separate CVE, CVE-2014-7169, has been assigned to cover the still-present vulnerability after the incorrect fix.

# Execution
```python exploit.py -r <rhost-url> -c <desired-command>```

<img src="https://i.ibb.co/581Rd6f/shell-shock.png" alt="shell-shock" border="0">

# Reference
[NIST NVD](https://nvd.nist.gov/vuln/detail/cve-2014-6271)
[MITRE Corporation](https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271)
File Snapshot

[4.0K] /data/pocs/ec00a84343b19a1a04ad389784cad669fec1ef49 ├── [1.2K] exploit.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.