Vulnerability Details : CVE-2014-6271
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Vulnerability category: Execute code
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2014-6271
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.
Added on
2022-01-28
Action due date
2022-07-28
Exploit prediction scoring system (EPSS) score for CVE-2014-6271
Probability of exploitation activity in the next 30 days: 97.57%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2014-6271
-
Advantech Switch Bash Environment Variable Code Injection (Shellshock)
Disclosure Date : 2015-12-01exploit/linux/http/advantech_switch_bash_env_execThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets the 'ping.sh' CGI script, accessible through the Boa web server on Advantech switches. This module was tested against firmware version 1322_D1.98. Authors: - hdm <[email protected]> -
IPFire Bash Environment Variable Injection (Shellshock)
Disclosure Date : 2014-09-29exploit/linux/http/ipfire_bashbug_execIPFire, a free linux based open source firewall distribution, version <= 2.15 Update Core 82 contains an authenticated remote command execution vulnerability via shellshock in the request headers. Authors: - h00die <[email protected]> - Claudio Viviani -
Qmail SMTP Bash Environment Variable Injection (Shellshock)
Disclosure Date : 2014-09-24exploit/unix/smtp/qmail_bash_env_execThis module exploits a shellshock vulnerability on Qmail, a public domain MTA written in C that runs on Unix systems. Due to the lack of validation on the MAIL FROM field, it is possible to execute shell code on a system with a vulnerable BASH (Shellshock). This flaw works on the latest Qmail versions (qmail-1.03 and netqmail-1.06). However, in order to execute code, /bin/sh has to be linked to bash (usually default configuration) and a valid recipient must be set on the RCPT TO field (usually [email protected]). The exploit does not work on the "qmailrocks" community version as it ensures the MAILFROM field is well-formed. Authors: - Mario Ledo (Metasploit module) - Gabriel Follon (Metasploit module) - Kyle George (Vulnerability discovery) -
Apache mod_cgi Bash Environment Variable Code Injection (Shellshock)
Disclosure Date : 2014-09-24exploit/multi/http/apache_mod_cgi_bash_env_execThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets CGI scripts in the Apache web server by setting the HTTP_USER_AGENT environment variable to a malicious function definition. Authors: - Stephane Chazelas - wvu <[email protected]> - juan vazquez <[email protected]> - lcamtuf -
DHCP Client Bash Environment Variable Code Injection (Shellshock)
Disclosure Date : 2014-09-24auxiliary/server/dhclient_bash_envThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets dhclient by responding to DHCP requests with a malicious hostname, domainname, and URL which are then passed to the configuration scripts as environment variables, resulting in code execution. Authors: - scriptjunkie - apconole <[email protected]> - Stephane Chazelas - Ramon de C Valle <[email protected]> -
CUPS Filter Bash Environment Variable Code Injection (Shellshock)
Disclosure Date : 2014-09-24exploit/multi/http/cups_bash_env_execThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets CUPS filters through the PRINTER_INFO and PRINTER_LOCATION variables. A valid username and password is required to exploit this vulnerability through CUPS. Authors: - Stephane Chazelas - lcamtuf - bcoles <[email protected]> -
Pure-FTPd External Authentication Bash Environment Variable Code Injection (Shellshock)
Disclosure Date : 2014-09-24exploit/multi/ftp/pureftpd_bash_env_execThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets the Pure-FTPd FTP server when it has been compiled with the --with-extauth flag and an external Bash script is used for authentication. If the server is not set up this way, the exploit will fail, even if the version of Bash in use is vulnerable. Authors: - Stephane Chazelas - Frank Denis - Spencer McIntyre -
Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner
Disclosure Date : 2014-09-24auxiliary/scanner/http/apache_mod_cgi_bash_envThis module scans for the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets CGI scripts in the Apache web server by setting the HTTP_USER_AGENT environment variable to a malicious function definition. PROTIP: Use exploit/multi/handler with a PAYLOAD appropriate to your CMD, set ExitOnSession false, run -j, and then run this module to create sessions on vulnerable hosts. Note that this is not the recommended method for obtaining shells. If you require sessions, please use the apache_mod_cgi_bash_env_exec exploit module instead. Authors: - Stephane Chazelas - wvu <[email protected]> - lcamtuf -
Dhclient Bash Environment Variable Injection (Shellshock)
Disclosure Date : 2014-09-24exploit/unix/dhcp/bash_environmentThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets dhclient by responding to DHCP requests with a malicious hostname, domainname, and URL which are then passed to the configuration scripts as environment variables, resulting in code execution. Due to length restrictions and the unusual networking scenario at the time of exploitation, this module achieves code execution by writing the payload into /etc/crontab and then cleaning it up after a session is created. Authors: - Stephane Chazelas - egypt <[email protected]> -
OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection (Shellshock)
Disclosure Date : 2014-09-24exploit/osx/local/vmware_bash_function_rootThis module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets the VMWare Fusion application, allowing an unprivileged local user to get root access. Authors: - Stephane Chazelas - juken - joev <[email protected]> - mubix <[email protected]>
CVSS scores for CVE-2014-6271
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
CWE ids for CVE-2014-6271
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: [email protected] (Primary)
References for CVE-2014-6271
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141330468527613&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141577297623641&w=2
Third Party Advisory
-
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141577137423233&w=2
Third Party Advisory
-
http://linux.oracle.com/errata/ELSA-2014-1293.html
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383138121313&w=2
Third Party Advisory
-
http://linux.oracle.com/errata/ELSA-2014-1294.html
Third Party Advisory
-
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141216207813411&w=2
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686447
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141345648114150&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141450491804793&w=2
Third Party Advisory
-
https://www.suse.com/support/shellshock/
Third Party Advisory
-
https://www.exploit-db.com/exploits/40619/
Third Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=141319209015420&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383304022067&w=2
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142113462216480&w=2
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141576728022234&w=2
Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1141597
Issue Tracking;Patch;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383244821813&w=2
Third Party Advisory
-
https://support.citrix.com/article/CTX200223
Third Party Advisory
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383026420882&w=2
Third Party Advisory
-
https://www.exploit-db.com/exploits/37816/
Third Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2014-1294.html
Third Party Advisory
-
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141694386919794&w=2
Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142721162228379&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141585637922673&w=2
Third Party Advisory
-
http://www.kb.cert.org/vuls/id/252743
Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/70103
Third Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=141235957116749&w=2
Third Party Advisory
-
https://www.exploit-db.com/exploits/34879/
Third Party Advisory;VDB Entry
-
https://access.redhat.com/node/1200223
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142805027510172&w=2
Third Party Advisory
-
http://secunia.com/advisories/61542
Third Party Advisory
-
https://www.exploit-db.com/exploits/38849/
Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/42938/
Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html
Third Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Third Party Advisory
-
https://www.exploit-db.com/exploits/39918/
Exploit;Third Party Advisory;VDB Entry
-
https://kb.bluecoat.com/index?page=content&id=SA82
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html
Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Third Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383081521087&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383465822787&w=2
Third Party Advisory
-
http://advisories.mageia.org/MGASA-2014-0388.html
Third Party Advisory
-
http://www.qnap.com/i/en/support/con_show.php?cid=61
Third Party Advisory
-
http://support.novell.com/security/cve/CVE-2014-6271.html
Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-1354.html
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html
Third Party Advisory
-
http://www.us-cert.gov/ncas/alerts/TA14-268A
Third Party Advisory;US Government Resource
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Third Party Advisory
-
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142358026505815&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141330425327438&w=2
Third Party Advisory
-
https://www.exploit-db.com/exploits/40938/
Third Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2014-1295.html
Third Party Advisory
-
http://secunia.com/advisories/62228
Third Party Advisory
-
http://seclists.org/fulldisclosure/2014/Oct/0
Mailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141216668515282&w=2
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html
Third Party Advisory
-
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Third Party Advisory
-
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
Third Party Advisory
-
http://www.securityfocus.com/archive/1/533593/100/0/threaded
Third Party Advisory;VDB Entry
-
https://support.apple.com/kb/HT6535
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Third Party Advisory
-
http://secunia.com/advisories/61547
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html
Third Party Advisory
-
https://access.redhat.com/articles/1200223
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html
Third Party Advisory
-
http://support.apple.com/kb/HT6495
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383353622268&w=2
Third Party Advisory
-
https://support.citrix.com/article/CTX200217
Third Party Advisory
-
http://www.novell.com/support/kb/doc.php?id=7015701
Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142546741516006&w=2
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Third Party Advisory
-
http://www.debian.org/security/2014/dsa-3032
Third Party Advisory
-
http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html
Exploit;Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686084
Third Party Advisory
-
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Third Party Advisory;VDB Entry;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=142719845423222&w=2
Third Party Advisory
- https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006
-
http://www.ubuntu.com/usn/USN-2362-1
Third Party Advisory
-
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Third Party Advisory;VDB Entry
-
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Third Party Advisory
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Third Party Advisory
-
https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Exploit;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141383196021590&w=2
Third Party Advisory
-
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142358078406056&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Third Party Advisory
-
http://jvn.jp/en/jp/JVN55667175/index.html
Vendor Advisory
-
http://marc.info/?l=bugtraq&m=141577241923505&w=2
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141879528318582&w=2
Third Party Advisory
-
http://secunia.com/advisories/59272
Third Party Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
Third Party Advisory
-
http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html
Third Party Advisory;VDB Entry
-
http://www.novell.com/support/kb/doc.php?id=7015721
Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-1293.html
Third Party Advisory
-
http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html
Third Party Advisory;VDB Entry
Products affected by CVE-2014-6271
- cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*