forked from p34709852/monkey
11 lines
730 B
Markdown
11 lines
730 B
Markdown
---
|
|
title: "ShellShock"
|
|
date: 2020-07-14T08:41:32+03:00
|
|
draft: false
|
|
tags: ["exploit", "linux"]
|
|
---
|
|
|
|
CVE-2014-6271, based on [logic in NCC group's GitHub](https://github.com/nccgroup/shocker/blob/master/shocker.py).
|
|
|
|
> GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."
|