Skip to content

K3ysTr0K3R/CVE-2014-6271-EXPLOIT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2014-6271 - Shellshock 💣

Shellshock is a critical vulnerability in the GNU Bash shell. It affects versions through 4.3 and allows remote attackers to execute arbitrary code. This exploit occurs due to how Bash processes trailing strings after function definitions in the values of environment variables.

🔍 Detailed Explanation

The Shellshock vulnerability allows an attacker to inject and execute code via specially crafted environment variables. These variables can be set through various vectors, such as:

  • The ForceCommand feature in OpenSSH's sshd
  • The mod_cgi and mod_cgid modules in the Apache HTTP Server
  • Scripts executed by unspecified DHCP clients

These scenarios involve setting environment variables across a privilege boundary, making it possible for attackers to execute arbitrary code with elevated privileges.

🚨 Disclaimer

⚠️ Disclaimer: This Proof of Concept (PoC) is for educational purposes only. The intention is to help security researchers and professionals understand the vulnerability and test their own systems. Any misuse of this information is strictly prohibited and may lead to legal consequences.