Example analysis of bash vulnerability recurrence

WBOY
Release: 2023-05-19 11:13:11
forward
1260 people have browsed it

Bourne Again Shell (BASH for short) is the most popular SHELL implementation on GNU/Linux. It was born in 1980. After decades of evolution, it has evolved from a simple terminal command line interpreter to one that is deeply integrated with the GNU system. Integrated multifunctional interface.

Bash, a type of Unix shell. The first official version was released in 1989. It was originally planned to be used on the GNU operating system, but it can run on most Unix-like operating systems, including Linux and Mac OS X v10.4, which use it as the default shell. It has also been ported to Cygwin and MinGW on Microsoft Windows, or is available as the DJGPP project on MS-DOS. There are also ports on Novell NetWare and Android.

The environment variables currently used by Bash are called through function names. What causes the vulnerability is that after the environment variables defined starting with "(){" are parsed into functions in the command ENV, Bash execution fails. Exit, but continue to parse and execute shell commands. The core reason is that there are no strict boundaries in the input filtering, and no legalized parameter judgments are made.

This article only records and implements the vulnerability recurrence. The utilization process is as follows:

1. Vulnerability environment

Link: http://192.168.101.152:8080/victim. cgi

Example analysis of bash vulnerability recurrence

2. Vulnerability payload

() { :; }; echo; /bin/cat /etc/passwd

Theoretically, you can inject a Bash command into the HTTP request for remote command execution

3. Use the process

to access the target

Example analysis of bash vulnerability recurrence

Replace the User-Agent value with payload to execute the command

Example analysis of bash vulnerability recurrence

User-Agent is not a required condition

Example analysis of bash vulnerability recurrence

<br>
Copy after login

The above is the detailed content of Example analysis of bash vulnerability recurrence. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:yisu.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!