Skip to content

mritunjay-k/CVE-2014-6271

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commits
 
 
 
 

Repository files navigation

CVE-2014-6271

A vulnerability known as "ShellShock" exists in GNU Bash through 4.3 due to how it processes trailing strings in the values of environment variables after function definitions. This vulnerability enables remote attackers to execute arbitrary code by crafting the environment in certain situations, including when the environment is set across a privilege boundary from Bash execution. The vulnerability has been demonstrated in various scenarios, such as the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, and scripts executed by unspecified DHCP clients. It should be noted that the original fix for this vulnerability was incorrect, and a separate CVE, CVE-2014-7169, has been assigned to cover the still-present vulnerability after the incorrect fix.

Execution

python exploit.py -r <rhost-url> -c <desired-command>

shell-shock

Reference

NIST NVD MITRE Corporation

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages