Hi Jim..

You'd have to have some very suspect code to pass through the required environment to bash via perl, php etc. (as it is really suspect to have bash as a CGI interpreter anything is possible!)

Either that or your machine would need to have malicious code dropped on it via another exploit, in which case the attacker will use the original exploit to deliver the payload rather than mess around with shellshock one would think.

While I don't disagree with the statement that any execution environment can be used to get the result from the flawed version of bash, the remote exploit is via apache/cgi at this stage and exploiting it via php/pearl/python would be of little value to attacker as it would be a low value secondary vector.

The DHCP one is interesting though. If you've got access to mess with a DHCP server, or create a rogue one on the network you're probably already on the local network with lots of juicy targets though...

However this could be used as a discovery mechanism if you were on the network and having problems finding targets.

Food for thought, that's for sure. ;-)

Cheers, Chris H.

On 26/09/14 11:10, Jim Cheetham wrote:
On Fri, Sep 26, 2014 at 10:36 AM, Chris Hellyar <[email protected] <mailto:[email protected]>> wrote:

    The current published/known exploit/vector from this is via
    apache, with cgi enabled and a cgi script using bash as it's
    interpreter.


Or any execution environment (mod_perl, PHP, etc) that runs code that uses "the shell" to run a command, e.g. `cmd` or system(cmd) - if /bin/sh points to /bin/bash you are potentially vulnerable, or if the code explicitly runs bash. Debian doesn't do this, they point the default shell to dash instead. RedHat does point to bash, and you can't trivially change it.

Beware of rogue DHCP responses on your local networks, too - most Linux runs "the shell" as part of dhclient.
https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/
I don't yet know of Android or iOS are vulnerable to DHCP shellshock.



_______________________________________________
Linux-users mailing list
[email protected]
http://lists.canterbury.ac.nz/mailman/listinfo/linux-users

Reply via email to