Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Readme
# CVE-2014-6271
A vulnerability known as "ShellShock" exists in GNU Bash through 4.3 due to how it processes trailing strings in the values of environment variables after function definitions. This vulnerability enables remote attackers to execute arbitrary code by crafting the environment in certain situations, including when the environment is set across a privilege boundary from Bash execution. The vulnerability has been demonstrated in various scenarios, such as the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, and scripts executed by unspecified DHCP clients. It should be noted that the original fix for this vulnerability was incorrect, and a separate CVE, CVE-2014-7169, has been assigned to cover the still-present vulnerability after the incorrect fix.

# Execution
```python exploit.py -r <rhost-url> -c <desired-command>```

<img src="https://i.ibb.co/581Rd6f/shell-shock.png" alt="shell-shock" border="0">

# Reference
[NIST NVD](https://nvd.nist.gov/vuln/detail/cve-2014-6271)
[MITRE Corporation](https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271)
File Snapshot

[4.0K] /data/pocs/ec00a84343b19a1a04ad389784cad669fec1ef49 ├── [1.2K] exploit.py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →