CVE-2014-6271

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to...

Basic Information

CVE State
PUBLISHED
Reserved Date
September 09, 2014
Published Date
September 24, 2014
Last Updated
February 07, 2025
Vendor
n/a
Product
n/a
Description
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVSS Scores

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2022-01-28 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-09-09 10:44:25 UTC) Source

References

https://www.exploit-db.com/exploits/37816/ http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 http://www-01.ibm.com/support/docview.wss?uid=swg21685749 http://marc.info/?l=bugtraq&m=141577137423233&w=2 http://marc.info/?l=bugtraq&m=142719845423222&w=2 https://www.exploit-db.com/exploits/39918/ http://marc.info/?l=bugtraq&m=141216668515282&w=2 http://rhn.redhat.com/errata/RHSA-2014-1295.html http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/ https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts http://marc.info/?l=bugtraq&m=141383138121313&w=2 http://marc.info/?l=bugtraq&m=142721162228379&w=2 http://www.securityfocus.com/archive/1/533593/100/0/threaded http://marc.info/?l=bugtraq&m=142358026505815&w=2 http://www-01.ibm.com/support/docview.wss?uid=swg21686084 http://www-01.ibm.com/support/docview.wss?uid=swg21686479 http://marc.info/?l=bugtraq&m=142719845423222&w=2 http://secunia.com/advisories/61188 http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 http://jvn.jp/en/jp/JVN55667175/index.html http://secunia.com/advisories/61676 https://www.exploit-db.com/exploits/40619/ http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html http://secunia.com/advisories/60433 https://www.exploit-db.com/exploits/38849/ http://marc.info/?l=bugtraq&m=141383026420882&w=2 http://marc.info/?l=bugtraq&m=141585637922673&w=2 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html http://marc.info/?l=bugtraq&m=141576728022234&w=2 http://www-01.ibm.com/support/docview.wss?uid=swg21685541 http://secunia.com/advisories/61715 http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html http://secunia.com/advisories/61816 http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html http://secunia.com/advisories/61442 http://marc.info/?l=bugtraq&m=142358078406056&w=2 http://marc.info/?l=bugtraq&m=142805027510172&w=2 http://secunia.com/advisories/61283 http://marc.info/?l=bugtraq&m=142113462216480&w=2 http://www.ubuntu.com/usn/USN-2362-1 https://kc.mcafee.com/corporate/index?page=content&id=SB10085 http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html http://secunia.com/advisories/61654 http://secunia.com/advisories/61542 http://www.novell.com/support/kb/doc.php?id=7015701 http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 http://secunia.com/advisories/62312 http://secunia.com/advisories/59272 http://marc.info/?l=bugtraq&m=141319209015420&w=2 https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html http://marc.info/?l=bugtraq&m=141879528318582&w=2 http://www-01.ibm.com/support/docview.wss?uid=swg21685604 http://marc.info/?l=bugtraq&m=142118135300698&w=2 http://secunia.com/advisories/61703 http://support.apple.com/kb/HT6495 http://www.kb.cert.org/vuls/id/252743 http://secunia.com/advisories/61065 http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html http://marc.info/?l=bugtraq&m=141383196021590&w=2 http://marc.info/?l=bugtraq&m=141383081521087&w=2 http://www-01.ibm.com/support/docview.wss?uid=swg21686445 http://www-01.ibm.com/support/docview.wss?uid=swg21686131 http://www.securityfocus.com/bid/70103 http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 http://marc.info/?l=bugtraq&m=141879528318582&w=2 http://www.us-cert.gov/ncas/alerts/TA14-268A http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html http://secunia.com/advisories/61641 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 https://access.redhat.com/node/1200223 http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html http://www-01.ibm.com/support/docview.wss?uid=swg21685914 http://seclists.org/fulldisclosure/2014/Oct/0 http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 http://rhn.redhat.com/errata/RHSA-2014-1293.html https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html http://marc.info/?l=bugtraq&m=142721162228379&w=2 http://secunia.com/advisories/60325 https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes http://secunia.com/advisories/60024 http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html https://www.exploit-db.com/exploits/34879/ https://access.redhat.com/articles/1200223 http://secunia.com/advisories/62343 http://secunia.com/advisories/61565 https://www.suse.com/support/shellshock/ http://marc.info/?l=bugtraq&m=141450491804793&w=2 http://secunia.com/advisories/61313 http://marc.info/?l=bugtraq&m=142358026505815&w=2 http://secunia.com/advisories/61873 http://secunia.com/advisories/61485 http://secunia.com/advisories/60947 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 https://support.apple.com/kb/HT6535 http://marc.info/?l=bugtraq&m=141577297623641&w=2 http://marc.info/?l=bugtraq&m=142546741516006&w=2 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 http://marc.info/?l=bugtraq&m=141383244821813&w=2 http://secunia.com/advisories/61312 http://secunia.com/advisories/60193 http://www.vmware.com/security/advisories/VMSA-2014-0010.html http://linux.oracle.com/errata/ELSA-2014-1294.html http://secunia.com/advisories/60063 http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html http://secunia.com/advisories/60034 http://marc.info/?l=bugtraq&m=141330425327438&w=2 http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html http://secunia.com/advisories/59907 http://secunia.com/advisories/58200 http://marc.info/?l=bugtraq&m=141577241923505&w=2 http://secunia.com/advisories/61643 http://www.novell.com/support/kb/doc.php?id=7015721 http://www-01.ibm.com/support/docview.wss?uid=swg21687079 http://secunia.com/advisories/61503 http://www-01.ibm.com/support/docview.wss?uid=swg21686246 http://rhn.redhat.com/errata/RHSA-2014-1354.html https://www.exploit-db.com/exploits/40938/ http://marc.info/?l=bugtraq&m=141216207813411&w=2 http://support.novell.com/security/cve/CVE-2014-6271.html http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 http://secunia.com/advisories/61547 http://marc.info/?l=bugtraq&m=141383465822787&w=2 http://www.qnap.com/i/en/support/con_show.php?cid=61 http://marc.info/?l=bugtraq&m=141694386919794&w=2 http://secunia.com/advisories/61552 http://secunia.com/advisories/61780 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 https://support.citrix.com/article/CTX200223 http://www.debian.org/security/2014/dsa-3032 http://www-01.ibm.com/support/docview.wss?uid=swg21686447 http://secunia.com/advisories/62228 http://marc.info/?l=bugtraq&m=141330468527613&w=2 http://secunia.com/advisories/61855 http://marc.info/?l=bugtraq&m=141235957116749&w=2 http://secunia.com/advisories/60044 http://secunia.com/advisories/61291 http://rhn.redhat.com/errata/RHSA-2014-1294.html http://marc.info/?l=bugtraq&m=141345648114150&w=2 http://secunia.com/advisories/59737 http://secunia.com/advisories/61287 http://marc.info/?l=bugtraq&m=141383353622268&w=2 http://marc.info/?l=bugtraq&m=142118135300698&w=2 https://bugzilla.redhat.com/show_bug.cgi?id=1141597 http://marc.info/?l=bugtraq&m=142118135300698&w=2 http://secunia.com/advisories/61711 http://marc.info/?l=bugtraq&m=142113462216480&w=2 http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 http://marc.info/?l=bugtraq&m=141383304022067&w=2 http://advisories.mageia.org/MGASA-2014-0388.html http://secunia.com/advisories/61128 https://support.citrix.com/article/CTX200217 http://secunia.com/advisories/61471 http://secunia.com/advisories/60055 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash http://secunia.com/advisories/61550 http://secunia.com/advisories/61633 http://linux.oracle.com/errata/ELSA-2014-1293.html http://www-01.ibm.com/support/docview.wss?uid=swg21686494 https://kb.bluecoat.com/index?page=content&id=SA82 http://secunia.com/advisories/61328 http://www-01.ibm.com/support/docview.wss?uid=swg21685733 https://www.exploit-db.com/exploits/42938/ http://secunia.com/advisories/61129 http://secunia.com/advisories/61700 http://secunia.com/advisories/61603 http://secunia.com/advisories/61857 http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-01-28 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

vmware_bash_function_root

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-6271

qmail_bash_env_exec

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-6271

bash_environment

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-6271

advantech_switch_bash_env_exec

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-6271

pureftpd_bash_env_exec

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-6271

ipfire_bashbug_exec

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-6271

YunchoHang/CVE-2014-6271-SHELLSHOCK

Type: github • Created: 2025-02-26 10:36:45 UTC • Stars: 0

Automation script to exploit the Shellshock vulnerability.

RadYio/CVE-2014-6271

Type: github • Created: 2024-11-26 09:07:24 UTC • Stars: 0

Projet de présentation d'une CVE (ShellShock) avec pdf, démonstration technique et reproductible

K3ysTr0K3R/CVE-2014-6271-EXPLOIT

Type: github • Created: 2024-05-18 19:42:58 UTC • Stars: 2

A PoC exploit for CVE-2014-6271 - Shellshock

0xN7y/CVE-2014-6271

Type: github • Created: 2023-10-31 06:48:30 UTC • Stars: 1

EXPLOIT FOR CVE-2014-6271

hanmin0512/CVE-2014-6271_pwnable

Type: github • Created: 2023-08-29 06:58:26 UTC • Stars: 0

Jsmoreira02/CVE-2014-6271

Type: github • Created: 2023-07-01 03:50:02 UTC • Stars: 0

Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi

Brandaoo/CVE-2014-6271

Type: github • Created: 2023-03-25 05:32:59 UTC • Stars: 0

mritunjay-k/CVE-2014-6271

Type: github • Created: 2023-03-02 17:30:03 UTC • Stars: 0

FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-

Type: github • Created: 2022-09-09 10:44:25 UTC • Stars: 0

[CVE-2014-6271] Apache Shellshock Remote Command Injection tool for quick reverse shell and file browsing

b4keSn4ke/CVE-2014-6271

Type: github • Created: 2021-07-29 04:51:43 UTC • Stars: 14

Shellshock exploit aka CVE-2014-6271

mochizuki875/CVE-2014-6271-Apache-Debian

Type: github • Created: 2021-07-24 07:47:55 UTC • Stars: 1

This Repo is PoC environment of CVE-2014-6271(https://nvd.nist.gov/vuln/detail/cve-2014-6271).

MuirlandOracle/CVE-2014-6271-IPFire

Type: github • Created: 2020-11-12 04:12:55 UTC • Stars: 0

cyberharsh/Shellbash-CVE-2014-6271

Type: github • Created: 2020-06-26 11:08:22 UTC • Stars: 0

Dilith006/CVE-2014-6271

Type: github • Created: 2020-05-12 18:37:14 UTC • Stars: 0

rashmikadileeshara/CVE-2014-6271-Shellshock-

Type: github • Created: 2020-05-12 17:51:06 UTC • Stars: 0

This is an individual assignment for secure network programming

Any3ite/CVE-2014-6271

Type: github • Created: 2020-01-06 08:24:35 UTC • Stars: 1

Sindayifu/CVE-2019-14287-CVE-2014-6271

Type: github • Created: 2019-11-13 14:17:19 UTC • Stars: 0

shawntns/exploit-CVE-2014-6271

Type: github • Created: 2019-04-27 18:55:39 UTC • Stars: 0

Aruthw/CVE-2014-6271

Type: github • Created: 2018-06-30 13:26:20 UTC • Stars: 0

w4fz5uck5/ShockZaum-CVE-2014-6271

Type: github • Created: 2018-06-18 16:09:15 UTC • Stars: 0

Shellshock vulnerability attacker

kowshik-sundararajan/CVE-2014-6271

Type: github • Created: 2018-05-05 05:50:50 UTC • Stars: 0

CS4238 Computer Security Practices

0x00-0x00/CVE-2014-6271

Type: github • Created: 2017-11-23 14:45:22 UTC • Stars: 3

Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.

zalalov/CVE-2014-6271

Type: github • Created: 2017-04-30 19:47:00 UTC • Stars: 6

Shellshock POC | CVE-2014-6271 | cgi-bin reverse shell

Pilou-Pilou/docker_CVE-2014-6271.

Type: github • Created: 2017-01-25 21:51:52 UTC • Stars: 0

opsxcq/exploit-CVE-2014-6271

Type: github • Created: 2016-12-07 23:38:50 UTC • Stars: 211

Shellshock exploit + vulnerable environment

ryeyao/CVE-2014-6271_Test

Type: github • Created: 2014-09-29 13:16:08 UTC • Stars: 1

u20024804/bash-4.3-fixed-CVE-2014-6271

Type: github • Created: 2014-09-27 22:22:41 UTC • Stars: 0

u20024804/bash-4.2-fixed-CVE-2014-6271

Type: github • Created: 2014-09-27 22:22:27 UTC • Stars: 0

u20024804/bash-3.2-fixed-CVE-2014-6271

Type: github • Created: 2014-09-27 21:29:23 UTC • Stars: 0

villadora/CVE-2014-6271

Type: github • Created: 2014-09-26 04:15:15 UTC • Stars: 0

scaner for cve-2014-6271

woltage/CVE-2014-6271

Type: github • Created: 2014-09-25 13:06:50 UTC • Stars: 0

ilismal/Nessus_CVE-2014-6271_check

Type: github • Created: 2014-09-25 09:02:42 UTC • Stars: 0

Quick and dirty nessus .audit file to check is bash is vulnerable to CVE-2014-6271

mattclegg/CVE-2014-6271

Type: github • Created: 2014-09-25 08:10:26 UTC • Stars: 0

jblaine/cookbook-bash-CVE-2014-6271

Type: github • Created: 2014-09-25 00:11:01 UTC • Stars: 0

Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271