Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2014-7169 PoC — GNU Bash 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:GNU Bash 操作系统命令注入漏洞 (CVE-2014-7169)
Description:GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
Description
CVE-2014-7169 Shell Shock
Readme
# SHELL-SCHOCK
CVE-2014-7169 Shell Shock
File Snapshot

[4.0K] /data/pocs/01601cd1228692dd4d2e1fd052ae1f1d297ad990 ├── [ 41] README.md └── [1.1K] shell shock.txt 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →