first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
This commit is contained in:
25
bash/CVE-2014-6271/README.md
Normal file
25
bash/CVE-2014-6271/README.md
Normal file
@@ -0,0 +1,25 @@
|
||||
# Bash Shellshock Remote Command Injection (CVE-2014-6271)
|
||||
|
||||
[中文版本(Chinese version)](README.zh-cn.md)
|
||||
|
||||
Build and run the vulnerable environment:
|
||||
|
||||
```
|
||||
docker compose build
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
When you visit `http://your-ip/` you should see two files:
|
||||
|
||||
- safe.cgi
|
||||
- victim.cgi
|
||||
|
||||
safe.cgi generated by the latest version of bash, and victim.cgi is the page generated by bash4.3 which is vulnerable to shellshock.
|
||||
|
||||
We can send include our payload in the user-agent string when visiting victim.cgi and the command is executed successfully:
|
||||
|
||||

|
||||
|
||||
The same request sent to safe.cgi is unaffected:
|
||||
|
||||

|
Reference in New Issue
Block a user