Apache Server - Remote Code Execution (Shellshock - CVE-2014-6271) (CVE-2014-6271)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Apache server is affected by a Remote Code Execution vulnerability, located in the bash environment variables. The root cause of this vulnerability consists in using a version of the bash binary before 4.3 which processes trailing strings after function definitions. Therefore, an unauthenticated remote attacker could use the Common Gateway Interface (CGI) and a crafted HTTP header like User-Agent to to execute commands on the server.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade bash utilitary to the latest version.
- References
https://nvd.nist.gov/vuln/detail/CVE-2014-6271
https://owasp.org/www-pdf-archive/Shellshock_-_Tudor_Enache.pdf
- Codename
- Shellshock
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Sep 2014
- Published at
- Updated at
- Software Type
- Utility
- Vendor
- GNU Project
- Product
- Bash