Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2014-6278

Description

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

POC

Reference

- http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html

- http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html

- http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html

- http://www-01.ibm.com/support/docview.wss?uid=swg21685541

- http://www-01.ibm.com/support/docview.wss?uid=swg21685733

- http://www.qnap.com/i/en/support/con_show.php?cid=61

- https://kc.mcafee.com/corporate/index?page=content&id=SB10085

- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183

- https://www.exploit-db.com/exploits/39568/

- https://www.exploit-db.com/exploits/39887/

Github

- https://github.com/0xBeacon/CiscoUCS-Shellshock

- https://github.com/0xICF/ShellScan

- https://github.com/3llio0T/Active-

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CyberlearnbyVK/redteam-notebook

- https://github.com/ElliotAtHelsinki/Course-Project-II

- https://github.com/EvanK/shocktrooper

- https://github.com/Jay-Idrees/UPenn-CyberSecurity-Penetration-Testing

- https://github.com/LiuYuancheng/ChatGPT_on_CTF

- https://github.com/Meowmycks/OSCPprep-SickOs1.1

- https://github.com/MrCl0wnLab/ShellShockHunter

- https://github.com/NINNiT/shellshock-lab

- https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups

- https://github.com/abdullah89255/Shellshock

- https://github.com/albinowax/ActiveScanPlusPlus

- https://github.com/demining/ShellShock-Attack

- https://github.com/derickjoseph8/Week-16-UCB-Homework

- https://github.com/devl00p/vulnerable_cups_shellshock_docker_image

- https://github.com/ericlake/fabric-shellshock

- https://github.com/foobarto/redteam-notebook

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck

- https://github.com/hannob/bashcheck

- https://github.com/inspirion87/w-test

- https://github.com/mrash/afl-cve

- https://github.com/mubix/shellshocker-pocs

- https://github.com/notsag-dev/htb-shocker

- https://github.com/opragel/shellshockFixOSX

- https://github.com/readloud/ShellShockHunter-v1.0

- https://github.com/rrmomaya2900/0dayWriteup-THM

- https://github.com/swapravo/cvesploit

- https://github.com/thatchriseckert/CiscoUCS-Shellshock

- https://github.com/trhacknon/Xpl-SHELLSHOCK-Ch3ck

- https://github.com/veeeveeeveee/tabijibiyori-wgetCloud-al5tVPOHMdTt9x2d

- https://github.com/wgetcloud-lab/tabijibiyori-wgetCloud-HSsQHorUi3eE3WPD

- https://github.com/xdistro/ShellShock