I read some articles (article1, article2, article3) about the Shellshock Bash bug (CVE-2014-6271 reported Sep 24, 2014) and have a general idea of what the vulnerability is and how it could be exploited. To better understand the implications of the bug, what would be a simple and specific example of how some software could exploit the bug?
Asked
Active
Viewed 6,616 times
3

Peter Mortensen
- 30,738
- 21
- 105
- 131

Rob Bednark
- 25,981
- 23
- 80
- 125
-
You should ask on [Information Security](http://security.stackexchange.com/) – glenn jackman Sep 25 '14 at 00:09
-
This question appears to be off-topic because it is about security and as such is better suitable for http://security.stackexchange.com – Eugene Mayevski 'Callback Sep 25 '14 at 06:22
-
3For others looking for this info (and maybe seeing this as the first hit in Google): http://security.stackexchange.com/questions/68122/what-is-a-specific-example-of-how-the-shellshock-bash-bug-could-be-exploited. I also found http://blog.erratasec.com/2014/09/bash-bug-as-big-as-heartbleed.html a helpful reference. – lennartcl Sep 25 '14 at 07:05
-
This is how to install the #ShellShock bug patch in #Ubuntu. First, run this on your shell prompt: $ env var='() { ignore this;}; echo vulnerable' bash -c /bin/true If you are vulnearble, it echos 'vulnerable'. If you are vulnerable, simply update with aptitude-get and install bash using these commands: $ sudo apt-get update $ sudo apt-get install bash – fasholaide Sep 25 '14 at 15:59
-
There are plenty of reports of attempted exploits in the wild; see for instance http://blog.sucuri.net/2014/09/bash-shellshocker-attacks-increase-in-the-wild-day-1.html – Charles Duffy Sep 26 '14 at 16:09
-
...basically, just throw exploit code in an HTTP header; if that header is exported to the environment (as is done in CGI) and anything calls a shell (and badly-written code that shells out is pretty damned common, especially in the PHP world), then there you are. – Charles Duffy Sep 26 '14 at 16:10