Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Description
Shellshock vulnerability reverse shell
Readme
### Poc exploit(bash script)<br>
[shell.webm](https://github.com/0xTabun/CVE-2014-6271/assets/144548207/16297451-8124-4211-8b1b-18461cdbeb4d)
### About the exploit<br>
You can get reverse shell with .sh file (in Linux)<br>
You can get reverse shell with .py file in (Windows and Linux) (in windows, you need to install netcat)<br>

You must specify the full url with file<br>

example: http://target/cgi-bin/vulnerable.sh<br>

* using for .py:<br>
python shellshock.py<br>

* using for .sh:<br>
chmod +x shellshock.sh<br>
./shellshock.sh<br>

##### Exploit Title: CVE-2014-6271 | Reverse shell<br>
***Author: Tabun***
File Snapshot

[4.0K] /data/pocs/4b082a57ddaf6c40ec768d8f8a4d25acd53a93c5 ├── [ 618] README.md ├── [ 598] readme.txt ├── [1.0K] shellshock.py └── [1.0K] shellshock.sh 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →