mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-14 15:08:03 +02:00
90 lines
4.7 KiB
Markdown
90 lines
4.7 KiB
Markdown
### [CVE-2014-7169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://linux.oracle.com/errata/ELSA-2014-1306.html
|
|
- http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
|
|
- http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
|
|
- http://www-01.ibm.com/support/docview.wss?uid=swg21685733
|
|
- http://www.qnap.com/i/en/support/con_show.php?cid=61
|
|
- http://www.ubuntu.com/usn/USN-2363-1
|
|
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
|
|
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
|
|
- https://www.exploit-db.com/exploits/34879/
|
|
|
|
#### Github
|
|
- https://github.com/9069332997/session-1-full-stack
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Az4ar/shocker
|
|
- https://github.com/ChefRycar/cookbook_shellshock
|
|
- https://github.com/CyberlearnbyVK/redteam-notebook
|
|
- https://github.com/EvanK/shocktrooper
|
|
- https://github.com/Gobinath-B/SHELL-SCHOCK
|
|
- https://github.com/IZAORICASTm/CHARQITO_NET
|
|
- https://github.com/JPedroVentura/Shocker
|
|
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
|
- https://github.com/LubinLew/WEB-CVE
|
|
- https://github.com/MrCl0wnLab/ShellShockHunter
|
|
- https://github.com/NickRycar/cookbook_shellshock
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/PixelDef/Shocker
|
|
- https://github.com/Prashant-kumar/totalshares
|
|
- https://github.com/SaltwaterC/sploit-tools
|
|
- https://github.com/UMDTERPS/Shell-Shock-Update
|
|
- https://github.com/ajansha/shellshock
|
|
- https://github.com/alexpop/mysecurity-cookbook
|
|
- https://github.com/andrewxx007/MyExploit-ShellShock
|
|
- https://github.com/ankh2054/linux-pentest
|
|
- https://github.com/cbk914/ShellShockCheck
|
|
- https://github.com/chef-boneyard/bash-shellshock
|
|
- https://github.com/demining/ShellShock-Attack
|
|
- https://github.com/dlitz/bash-shellshock
|
|
- https://github.com/dokku-alt/dokku-alt
|
|
- https://github.com/foobarto/redteam-notebook
|
|
- https://github.com/gina-alaska/bash-cve-2014-7169-cookbook
|
|
- https://github.com/giterlizzi/secdb-feeds
|
|
- https://github.com/gitter-badger/scripts-3
|
|
- https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck
|
|
- https://github.com/h0n3yb/poc-development
|
|
- https://github.com/hannob/bashcheck
|
|
- https://github.com/ido/macosx-bash-92-shellshock-patched
|
|
- https://github.com/inspirion87/w-test
|
|
- https://github.com/jackbezalel/patchme
|
|
- https://github.com/jcollie/shellshock_salt_grain
|
|
- https://github.com/jdauphant/patch-bash-shellshock
|
|
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
|
|
- https://github.com/make0day/pentest
|
|
- https://github.com/matthewlinks/shellshock-Ansible
|
|
- https://github.com/meherarfaoui09/meher
|
|
- https://github.com/milesbench/ShellshockScan
|
|
- https://github.com/mrigank-9594/Exploit-Shellshock
|
|
- https://github.com/mritunjay-k/CVE-2014-6271
|
|
- https://github.com/mubix/shellshocker-pocs
|
|
- https://github.com/mwhahaha/ansible-shellshock
|
|
- https://github.com/numenta/agamotto
|
|
- https://github.com/opragel/shellshockFixOSX
|
|
- https://github.com/opsxcq/exploit-CVE-2014-6271
|
|
- https://github.com/pbr94/Shellshock-Bash-Remote-Code-Execution-Vulnerability-and-Exploitation
|
|
- https://github.com/prince-stark/SHELL-SCHOCK
|
|
- https://github.com/rcvalle/exploits
|
|
- https://github.com/readloud/ShellShockHunter-v1.0
|
|
- https://github.com/renanvicente/puppet-shellshock
|
|
- https://github.com/ricedu/bash-4.2-patched
|
|
- https://github.com/thydel/ar-fix-bash-bug
|
|
- https://github.com/timb-machine-mirrors/rcvalle-exploits
|
|
- https://github.com/trhacknon/Xpl-SHELLSHOCK-Ch3ck
|
|
- https://github.com/trhacknon/exploit-CVE-2014-6271
|
|
- https://github.com/unixorn/shellshock-patch-osx
|
|
- https://github.com/warriordog/little-log-scan
|
|
- https://github.com/xdistro/ShellShock
|
|
|