Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Readme
# Shellshock Remote Command Injection (CVE-2014-6271)

[中文版本(Chinese version)](README.zh-cn.md)

Build and run the vulnerable environment:

```
docker-compose build
docker-compose up -d
```

When you visit `http://your-ip/` you should see two files:

 - safe.cgi
 - victim.cgi

safe.cgi generated by the latest version of bash, and victim.cgi is the page generated by bash4.3 which is vulnerable to shellshock.

We can send include our payload in the user-agent string when visiting victim.cgi and the command is executed successfully:

![](1.png)

The same request sent to safe.cgi is unaffected:

![](2.png)
File Snapshot

[4.0K] /data/pocs/b3d15ea52dff037807d9254f645889e5ed22262b ├── [ 22K] 1.png ├── [ 33K] 2.png ├── [ 215] docker-compose.yml ├── [ 194] Dockerfile ├── [ 13] flagA ├── [ 620] README.md ├── [ 515] README.zh-cn.md ├── [ 299] safe.cgi └── [ 320] victim.cgi 0 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →