Summary
This host is installed with GNU Bash Shell
and is prone to remote command execution vulnerability.
Impact
Successful exploitation will allow remote
or local attackers to inject shell commmands, allowing local privilege escalation or remote command execution depending on the application vector.
Impact Level: Application
Solution
Apply the patch or upgrade to latest version,
For updates refer to http://www.gnu.org/software/bash/
Insight
GNU bash contains a flaw that is triggered
when evaluating environment variables passed from another environment.
After processing a function definition, bash continues to process trailing strings.
Affected
GNU Bash through 4.3
Detection
Send a crafted command via HTTP GET
request and check remote command execution.
References
Severity
Classification
-
CVE CVE-2014-6271, CVE-2014-6278 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
- 68designs 68kb Multiple Remote File Include Vulnerabilities
- Apple Safari PDF Javascript Security Bypass Bypass Vulnerability
- Andy's PHP Knowledgebase 's' Parameter SQL Injection Vulnerability