10
CVSSv2

CVE-2014-6278

Published: 30/09/2014 Updated: 17/11/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

GNU Bash up to and including 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote malicious users to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu bash 1.14.5

gnu bash 1.14.6

gnu bash 2.03

gnu bash 2.04

gnu bash 3.2.48

gnu bash 4.0

gnu bash 1.14.1

gnu bash 1.14.2

gnu bash 2.01

gnu bash 2.01.1

gnu bash 3.0

gnu bash 3.0.16

gnu bash 4.2

gnu bash 4.3

gnu bash 1.14.0

gnu bash 1.14.7

gnu bash 2.0

gnu bash 2.05

gnu bash 4.1

gnu bash 1.14.3

gnu bash 1.14.4

gnu bash 2.02

gnu bash 2.02.1

gnu bash 3.1

gnu bash 3.2

Vendor Advisories

Several security issues were fixed in Bash ...
Description of Problem Citrix is aware of recent vulnerability reports that impact GNU Bash and is actively investigating the potential impact of these issues on Citrix products There are a number of CVEs related to this issue, the current set includes: CVE-2014-6271  CVE-2014-6277  CVE-2014-6278  CVE-2014-7169  CVE-2014-7 ...
GNU bash contains a flaw that is triggered when evaluating environment variables passed from another environment After processing a function definition, bash continues to process trailing strings Via certain applications, a local or remote attacker may inject shell commands, allowing local privilege escalation or remote command execution dependin ...

Exploits

#!/usr/bin/python ############################################### # Cisco UCS Manager 21(1b) Shellshock Exploit # # CVE-2014-6278 # Confirmed on version 21(1b), but more are likely vulnerable # Cisco's advisory: # toolsciscocom/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash # Exploit generates a reverse shell to ...
#!/usr/bin/python # Exploit Title: dhclient shellshocker # Google Dork: n/a # Date: 10/1/14 # Exploit Author: @0x00string # Vendor Homepage: gnuorg # Software Link: ftpgnuorg/gnu/bash/bash-43targz # Version: 4311 # Tested on: Ubuntu 14041 # CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187 # ______ ...
#! /usr/bin/env python from socket import * from threading import Thread import thread, time, httplib, urllib, sys stop = False proxyhost = "" proxyport = 0 def usage(): print """ Shellshock apache mod_cgi remote exploit Usage: /exploitpy var=<value> Vars: rhost: victim host rport: victim port for TCP shell binding lhost: attacker ...
# Exploit Title: ShellShock On Sun Secure Global Desktop & Oracle Global desktop # Google Dork: intitle:Install the Sun Secure Global Desktop Native Client # Date: 6/4/2016 # Exploit Author: lastc0de@outlookcom # Vendor Homepage: wwwsuncom/ & wwworaclecom/ # Software Link: wwworaclecom/technetwork/server-storage/ ...
#!/usr/bin/python # Exploit Title: ShellShock dhclient Bash Environment Variable Command Injection PoC # Date: 2014-09-29 # Author: @fdiskyou # e-mail: rui at deniableorg # Version: 41 # Tested on: Debian, Ubuntu, Kali # CVE: CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187 from scapyall import * confcheckIPaddr = Fal ...
Cisco UCS Manager version 21(1b) shellshock exploit that spawns a connect-back shell ...
This Metasploit module exploits a post-auth code injection in specially crafted environment variables in Bash, specifically targeting CUPS filters through the PRINTER_INFO and PRINTER_LOCATION variables by default ...
DNS reverse lookups can be used as a vector of attack for the bash shellshock vulnerability ...
GNU Bash version 4311 environment variable dhclient shellshocker exploit ...
This is information regarding more bash vulnerabilities and how the original bash patches are ineffective ...

Github Repositories

We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environment to run cmds to solve the CTF problems (Whether the AI large language models can understand the challenge question and capture the question flags)

ChatGPT(AI LLM)_on_CTF Project Design Purpose: We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environment to run cmds to solve the CTF problems (Whether the AI large language models can understand the challenge question and capture the question flags) And we will also show some use cases about ho

Find SearchSploit exploits by CVE-IDs / dpkg status file

cvesploit Find SearchSploit exploits by CVE-IDs / dpkg status file CVE Mode Vulnerablitiy Scanners often return the CVE-IDs in their scans /cvesploit CVE-2018-11776 CVE-2018-11776 Apache Struts 23 < 2334 / 25 < 2516 - Remote Code Execution (1) exploits/linux/remote/45260py Apache Struts 23 < 2334 / 25 < 2516 -

Shellshock Vulnerability Scanner

ShellScan ShellScan - A simple Shellshock Vulnerability Scanner in python allows cyber security researchers to explore and discover new application and systems that vulnerable to the ShellShock exploit ShellScan supports different BASH vulnerabilities: CVE-2014-6271 and CVE-2014-6278 to be tested by cyber security researchers in order to explore and discover new applications a

Performed an RCE by exploiting the "Shellshock" vulnerability and hijacked a webserver.

OSCP Prep - SickOs 11 Note: This box was completed long ago and I am going off of the VMware snapshot I saved after completion, some visuals will be missing and explained instead Objective We must go from visiting a simple website to having root access over the entire web server We'll download the VM from here and set it up with VMware Workstation 16 Once the machine i

Performed an RCE by exploiting the "Shellshock" vulnerability and hijacked a webserver.

OSCP Prep - SickOs 11 Note: This box was completed long ago and I am going off of the VMware snapshot I saved after completion, some visuals will be missing and explained instead Objective We must go from visiting a simple website to having root access over the entire web server We'll download the VM from here and set it up with VMware Workstation 16 Once the machine i

Cisco UCS Manager 21(1b) Shellshock Exploit CVE-2014-6278 Confirmed on version 21(1b), but more are likely vulnerable Cisco's advisory: toolsciscocom/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash Exploit generates a reverse shell to a nc listener Exploit Author: @thatchriseckert Exploit goes after a specific cgi script in Cisco UCS ma

Performed an RCE by exploiting the "Shellshock" vulnerability and hijacked a webserver.

OSCP Prep - SickOs 11 Note: This box was completed long ago and I am going off of the VMware snapshot I saved after completion, some visuals will be missing and explained instead Objective We must go from visiting a simple website to having root access over the entire web server We'll download the VM from here and set it up with VMware Workstation 16 Once the machine i

We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environment to run cmds to solve the CTF problems (Whether the AI large language models can understand the challenge question and capture the question flags)

ChatGPT(AI LLM)_on_CTF Project Design Purpose: We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environment to run cmds to solve the CTF problems (Whether the AI large language models can understand the challenge question and capture the question flags) And we will also show some use cases about ho

CTF Writeup

0day First as usual, nmap # Nmap 792 scan initiated Tue Dec 7 15:07:13 2021 as: nmap -vvv -p 22,80 -sCV -oA init 101018175 Nmap scan report for boxip (101018175) Host is up, received conn-refused (021s latency) Scanned at 2021-12-07 15:07:14 +07 for 14s PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 661p1 Ubuntu 2ubuntu213 (Ubuntu Linu

Penetration Testing /Ethical Hacking Pentesting Tools and Softwares Engagement It is the act of hacking into a company's netework after obtaining permission It has 5 stages Planning and Reconnaissance /information gathering Scanning Exploitation Post Exploitation Reporting Planning and prep for attack Types of Pen Testing No view or black box hacking into a compan

Cyberscecurity Project 2 Introduction Within this project, we'll utilize the Metasploit Framework to execute diverse attacks on a virtual machine (VM) hosting Metasploitable 3 and running Snort The plan involves conducting five attacks, with three of them being detectable by Snort, while the remaining two will go undetected by Snort Setting up the Metasploitable VM First

Penetration Testing /Ethical Hacking Pentesting Tools and Softwares Engagement It is the act of hacking into a company's netework after obtaining permission It has 5 stages Planning and Reconnaissance /information gathering Scanning Exploitation Post Exploitation Reporting Planning and prep for attack Types of Pen Testing No view or black box hacking into a compan

References

CWE-78https://security-tracker.debian.org/tracker/CVE-2014-6278http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1147414https://www.suse.com/support/shellshock/http://support.novell.com/security/cve/CVE-2014-6278.htmlhttp://secunia.com/advisories/61641http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlhttps://kb.bluecoat.com/index?page=content&id=SA82http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashhttp://secunia.com/advisories/61485http://secunia.com/advisories/59907http://www.ubuntu.com/usn/USN-2380-1http://secunia.com/advisories/61654http://www-01.ibm.com/support/docview.wss?uid=swg21685749http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlhttp://secunia.com/advisories/61565http://www.novell.com/support/kb/doc.php?id=7015721http://secunia.com/advisories/61643http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlhttp://secunia.com/advisories/61503https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlhttp://secunia.com/advisories/61633http://secunia.com/advisories/61552http://www-01.ibm.com/support/docview.wss?uid=swg21685914http://secunia.com/advisories/61703http://secunia.com/advisories/61283http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272http://secunia.com/advisories/61603http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlhttp://marc.info/?l=bugtraq&m=141330468527613&w=2http://marc.info/?l=bugtraq&m=141345648114150&w=2https://support.citrix.com/article/CTX200217http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879http://secunia.com/advisories/60034http://secunia.com/advisories/61816http://secunia.com/advisories/61128http://secunia.com/advisories/61313http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898http://www-01.ibm.com/support/docview.wss?uid=swg21685733http://secunia.com/advisories/61442http://secunia.com/advisories/61287https://support.citrix.com/article/CTX200223http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279http://secunia.com/advisories/60055http://secunia.com/advisories/61129http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897http://secunia.com/advisories/61780http://www-01.ibm.com/support/docview.wss?uid=swg21686479http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315http://www-01.ibm.com/support/docview.wss?uid=swg21685541https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlhttp://secunia.com/advisories/61471http://secunia.com/advisories/58200http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915http://secunia.com/advisories/61328http://secunia.com/advisories/61857http://secunia.com/advisories/60193http://www-01.ibm.com/support/docview.wss?uid=swg21685604http://secunia.com/advisories/61065http://secunia.com/advisories/61550http://secunia.com/advisories/60325http://www-01.ibm.com/support/docview.wss?uid=swg21686131http://secunia.com/advisories/61312http://www-01.ibm.com/support/docview.wss?uid=swg21686494http://secunia.com/advisories/60063http://secunia.com/advisories/61291http://secunia.com/advisories/60044http://www-01.ibm.com/support/docview.wss?uid=swg21686246http://www-01.ibm.com/support/docview.wss?uid=swg21686445https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertshttp://www-01.ibm.com/support/docview.wss?uid=swg21687079http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361http://secunia.com/advisories/60433http://secunia.com/advisories/60024http://marc.info/?l=bugtraq&m=141383353622268&w=2http://marc.info/?l=bugtraq&m=141383304022067&w=2http://marc.info/?l=bugtraq&m=141383244821813&w=2http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlhttp://marc.info/?l=bugtraq&m=141450491804793&w=2http://jvn.jp/en/jp/JVN55667175/index.htmlhttp://marc.info/?l=bugtraq&m=141383081521087&w=2http://www.qnap.com/i/en/support/con_show.php?cid=61http://marc.info/?l=bugtraq&m=141383026420882&w=2http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126http://marc.info/?l=bugtraq&m=141383196021590&w=2http://marc.info/?l=bugtraq&m=141383465822787&w=2http://marc.info/?l=bugtraq&m=141577137423233&w=2http://marc.info/?l=bugtraq&m=141577241923505&w=2http://marc.info/?l=bugtraq&m=141576728022234&w=2http://marc.info/?l=bugtraq&m=141577297623641&w=2http://marc.info/?l=bugtraq&m=141585637922673&w=2http://secunia.com/advisories/62312http://secunia.com/advisories/59961http://secunia.com/advisories/62343http://linux.oracle.com/errata/ELSA-2014-3093http://linux.oracle.com/errata/ELSA-2014-3094http://marc.info/?l=bugtraq&m=142358026505815&w=2http://marc.info/?l=bugtraq&m=142358078406056&w=2http://marc.info/?l=bugtraq&m=141879528318582&w=2http://marc.info/?l=bugtraq&m=142118135300698&w=2http://marc.info/?l=bugtraq&m=142721162228379&w=2http://www.mandriva.com/security/advisories?name=MDVSA-2015:164http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.htmlhttps://www.exploit-db.com/exploits/39887/https://kc.mcafee.com/corporate/index?page=content&id=SB10085https://www.exploit-db.com/exploits/39568/https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006https://usn.ubuntu.com/2380-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/39568/