目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2014-6271— GNU Bash 远程代码执行漏洞

KEV EPSS 94.22% · P100
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2014-6271の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
N/A
ソース: NVD (National Vulnerability Database)
脆弱性説明
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
GNU Bash 远程代码执行漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceComman
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
-n/a n/a -

II. CVE-2014-6271の公開POC

#POC説明ソースリンクShenlongリンク
1Collected fixes for bash CVE-2014-6271https://github.com/dlitz/bash-cve-2014-6271-fixesPOC詳細
2Patch for CVE-2014-6271https://github.com/npm/ansible-bashpocalypsePOC詳細
3patched-bash-4.3 for CVE-2014-6271https://github.com/ryancnelson/patched-bash-4.3POC詳細
4Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271https://github.com/jblaine/cookbook-bash-CVE-2014-6271POC詳細
5Nonehttps://github.com/rrreeeyyy/cve-2014-6271-specPOC詳細
6Python Scanner for "ShellShock" (CVE-2014-6271)https://github.com/scottjpack/shellshock_scannerPOC詳細
7Written fro CVE-2014-6271https://github.com/Anklebiter87/Cgi-bin_bash_ReversePOC詳細
8a auto script to fix CVE-2014-6271 bash vulnerabilityhttps://github.com/justzx2011/bash-upPOC詳細
9Nonehttps://github.com/mattclegg/CVE-2014-6271POC詳細
10Quick and dirty nessus .audit file to check is bash is vulnerable to CVE-2014-6271https://github.com/ilismal/Nessus_CVE-2014-6271_checkPOC詳細
11CVE-2014-6271 RCE tool https://github.com/RainMak3r/RainstormPOC詳細
12Simple script to check for CVE-2014-6271https://github.com/gabemarshall/shocknawwPOC詳細
13Nonehttps://github.com/woltage/CVE-2014-6271POC詳細
14CVE-2014-6271の検証用Vagrantfileですhttps://github.com/ariarijp/vagrant-shellshockPOC詳細
15scripts associate with bourne shell EVN function parsing vulnerability CVE-2014-6271https://github.com/themson/shellshockPOC詳細
16CVE-2014-6271 (ShellShock) RCE PoC tool https://github.com/securusglobal/BadBashPOC詳細
17scaner for cve-2014-6271https://github.com/villadora/CVE-2014-6271POC詳細
18Salt recipe for shellshock (CVE-2014-6271)https://github.com/APSL/salt-shellshockPOC詳細
19Ansible role to check the CVE-2014-6271 vulnerabilityhttps://github.com/teedeedubya/bash-fix-exploitPOC詳細
20Debian Lenny Bash packages with cve-2014-6271 patches (i386 and amd64)https://github.com/internero/debian-lenny-bash_3.2.52-cve-2014-6271POC詳細
21Nonehttps://github.com/u20024804/bash-3.2-fixed-CVE-2014-6271POC詳細
22Nonehttps://github.com/u20024804/bash-4.2-fixed-CVE-2014-6271POC詳細
23Nonehttps://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271POC詳細
24A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific serverhttps://github.com/francisck/shellshock-cgiPOC詳細
25A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug)https://github.com/proclnas/ShellShock-CGI-ScanPOC詳細
26CVE-2014-6271 Remote Interactive Shell - PoC Exploithttps://github.com/sch3m4/RISPOC詳細
27Nonehttps://github.com/ryeyao/CVE-2014-6271_TestPOC詳細
28shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGIhttps://github.com/cj1324/CGIShellPOC詳細
29This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possiblehttps://github.com/renanvicente/puppet-shellshockPOC詳細
30Android app to scan for bash Vulnerability - CVE-2014-6271 also known as Shellshockhttps://github.com/indiandragon/Shellshock-Vulnerability-ScanPOC詳細
31:scream: Python library and utility for CVE-2014-6271 (aka. "shellshock")https://github.com/ramnes/pyshellshockPOC詳細
32This is a Python Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271https://github.com/akiraaisha/shellshocker-pythonPOC詳細
33Using google to scan sites for "ShellShock" (CVE-2014-6271)https://github.com/352926/shellshock_crawlerPOC詳細
34system reading coursehttps://github.com/kelleykong/cve-2014-6271-mengjia-kongPOC詳細
35reading coursehttps://github.com/huanlu/cve-2014-6271-huan-luPOC詳細
36This is an Android Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271https://github.com/sunnyjiang/shellshocker-androidPOC詳細
37A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug).https://github.com/P0cL4bs/ShellShock-CGI-ScanPOC詳細
38Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshockhttps://github.com/hmlio/vaas-cve-2014-6271POC詳細
39Shellshock exploit + vulnerable environmenthttps://github.com/opsxcq/exploit-CVE-2014-6271POC詳細
40Nonehttps://github.com/Pilou-Pilou/docker_CVE-2014-6271.POC詳細
41Shellshock POC | CVE-2014-6271 | cgi-bin reverse shellhttps://github.com/zalalov/CVE-2014-6271POC詳細
42A simple python shell-like exploit for the Shellschok CVE-2014-6271 bug.https://github.com/heikipikker/shellshock-shellPOC詳細
43Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.https://github.com/0x00-0x00/CVE-2014-6271POC詳細
44CS4238 Computer Security Practiceshttps://github.com/kowshik-sundararajan/CVE-2014-6271POC詳細
45Shellshock vulnerability attackerhttps://github.com/w4fz5uck5/ShockZaum-CVE-2014-6271POC詳細
46Nonehttps://github.com/Aruthw/CVE-2014-6271POC詳細
47cve-2014-6271https://github.com/cved-sources/cve-2014-6271POC詳細
48Nonehttps://github.com/shawntns/exploit-CVE-2014-6271POC詳細
49Nonehttps://github.com/Sindadziy/cve-2014-6271POC詳細
50cve-2014-6271https://github.com/wenyu1999/bash-shellshockPOC詳細
51Nonehttps://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271POC詳細
52Nonehttps://github.com/Any3ite/CVE-2014-6271POC詳細
53*CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul ---https://github.com/somhm-solutions/Shell-ShockPOC詳細
54This is an individual assignment for secure network programminghttps://github.com/rashmikadileeshara/CVE-2014-6271-Shellshock-POC詳細
55Nonehttps://github.com/Dilith006/CVE-2014-6271POC詳細
56Nonehttps://github.com/cyberharsh/Shellbash-CVE-2014-6271POC詳細
57Nonehttps://github.com/MuirlandOracle/CVE-2014-6271-IPFirePOC詳細
58This Repo is PoC environment of CVE-2014-6271(https://nvd.nist.gov/vuln/detail/cve-2014-6271).https://github.com/mochizuki875/CVE-2014-6271-Apache-DebianPOC詳細
59Shellshock exploit aka CVE-2014-6271https://github.com/b4keSn4ke/CVE-2014-6271POC詳細
60CVE-2014-6271 Shellshockhttps://github.com/hadrian3689/shellshockPOC詳細
61ShellShock interactive-shell exploithttps://github.com/akr3ch/CVE-2014-6271POC詳細
62Nonehttps://github.com/0xConstant/CVE-2014-6271POC詳細
63[Python/Shell] - Tested in HackTheBox - Shocker (Easy) CVE-2014-6271https://github.com/Gurguii/cgi-bin-shellshockPOC詳細
64A docker container vulnerable to Shellshock - CVE-2014-6271https://github.com/anujbhan/shellshock-victim-hostPOC詳細
65[CVE-2014-6271] Apache Shellshock Remote Command Injection tool for quick reverse shell and file browsinghttps://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-POC詳細
66Nonehttps://github.com/mritunjay-k/CVE-2014-6271POC詳細
67Nonehttps://github.com/Brandaoo/CVE-2014-6271POC詳細
68Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgihttps://github.com/Jsmoreira02/CVE-2014-6271POC詳細
69Nonehttps://github.com/hanmin0512/CVE-2014-6271_pwnablePOC詳細
70Shellshock vulnerability reverse shellhttps://github.com/0xTabun/CVE-2014-6271POC詳細
71EXPLOIT FOR CVE-2014-6271https://github.com/0xN7y/CVE-2014-6271POC詳細
72The Shellshock Exploit is a tool designed to efficiently exploit the Shellshock vulnerability (CVE-2014-6271) in susceptible CGI servers, enabling a precise takeover of the target server. Shellshock is a critical security vulnerability that affects the Bash shell, allowing attackers to execute arbitrary commands on the targeted systemhttps://github.com/MY7H404/CVE-2014-6271-ShellshockPOC詳細
73Shellshock exploit (CVE-2014-6271)https://github.com/AlissoftCodes/ShellshockPOC詳細
74Python3 Shellshock (CVE-2014-6271) Scannerhttps://github.com/hackintoanetwork/shellshockPOC詳細
75Shellshock exploit (CVE-2014-6271)https://github.com/AlissonFaoli/ShellshockPOC詳細
76Shelly is a lightweight and efficient vulnerability scanner designed to identify and mitigate Shellshock (CVE-2014-6271 & CVE-2014-7169) vulnerabilities in Bash environments.https://github.com/ajansha/shellshockPOC詳細
77A PoC exploit for CVE-2014-6271 - Shellshockhttps://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOITPOC詳細
78Exploit para abusar de la vulnerabilidad Shellshock (CVE-2014-6271).https://github.com/TheRealCiscoo/Shellshock-ExploitPOC詳細
79Nonehttps://github.com/RadYio/CVE-2014-6271POC詳細
80Nonehttps://github.com/banomaly/CVE-2014-6271POC詳細
81Vulnerability Exploitationhttps://github.com/YunchoHang/CVE-2014-6271-SHELLSHOCKPOC詳細
82GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ShellShock.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-6271.yamlPOC詳細
83Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Shellshock%20%E7%A0%B4%E5%A3%B3%E6%BC%8F%E6%B4%9E%20CVE-2014-6271.mdPOC詳細
84Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/bash-cve-2014-6271.ymlPOC詳細
85https://github.com/vulhub/vulhub/blob/master/bash/CVE-2014-6271/README.mdPOC詳細
86Nonehttps://github.com/Isidoro4-kor/bash-CVE-2014-6271POC詳細
87Shellshock Vulnerability Scannerhttps://github.com/moften/CVE-2014-6271POC詳細
88CVE-2014-6271(RCE) poc Exploithttps://github.com/knightc0de/Shellshock_vuln_ExploitPOC詳細
89This is my implementation of shellshock exploithttps://github.com/rsherstnev/CVE-2014-6271POC詳細
90Nonehttps://github.com/RAJMadhusankha/Shellshock-CVE-2014-6271-Exploitation-and-AnalysisPOC詳細
91Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgihttps://github.com/J0hnTh3Kn1ght/CVE-2014-6271POC詳細
92A complete, modern demonstration lab for CVE-2014-6271 (Shellshock), including architecture, exploitation steps, Burp Suite usage, reverse shells, countermeasures, and full command cheat-sheet.https://github.com/DrHaitham/CVE-2014-6271-Shellshock-POC詳細
93Recreating Shellshock (CVE-2014-6271) - the bash vulnerability that endangered millions of servers. Automated exploitation toolkit + Burp Suite methodology + Docker lab. Built for security research & education. Offensive security portfolio project.https://github.com/mtaha-sec/bash-apocalypsePOC詳細
94Nonehttps://github.com/andres101c/Shellshock-CVE-2014-6271POC詳細
95CVE-2014-6271 Shellshockhttps://github.com/Industri4l-H3ll-Xpl0it3rs/CVE-2014-6271-ShellshockPOC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2014-6271のインテリジェンス情報

お願いします ログイン より多くのインテリジェンス情報を見る

Same Patch Batch · n/a · 2014-09-24 · 12 CVEs total

CVE-2014-6693Android Juiker应用程序加密问题漏洞
CVE-2014-6694Android 5SOS Family Planet应用程序加密问题漏洞
CVE-2014-6695Android Wedding Photo Frames-Love Pics应用程序加密问题漏洞
CVE-2014-6696Android Candy Girl Party Makeover应用程序加密问题漏洞
CVE-2014-6697Android Morocco Weather应用程序加密问题漏洞
CVE-2014-6698Android Galaxy Online 2应用程序加密问题漏洞
CVE-2014-6699Android Weather Channel应用程序加密问题漏洞
CVE-2014-6700Android NBA Game Time 2013-2014应用程序加密问题漏洞
CVE-2014-6701Android Vendormate Mobile应用程序加密问题漏洞
CVE-2014-3380Cisco Unified Communications Domain Manager Platform Software 安全漏洞
CVE-2014-5323Android Yuko Yuko应用程序加密问题漏洞

IV. 関連脆弱性

V. CVE-2014-6271へのコメント

まだコメントはありません


コメントを残す