SirGod Posted September 24, 2014 Report Posted September 24, 2014 Urat. Mailing list: oss-security - CVE-2014-6271: remote code execution through bashPentru cei lenesi:Bash supports exporting not just shell variables, but also shellfunctions to other bash instances, via the process environment to(indirect) child processes. Current bash versions use an environmentvariable named by the function name, and a function definitionstarting with “() {” in the variable value to propagate functiondefinitions through the environment. The vulnerability occurs becausebash does not stop after processing the function definition; itcontinues to parse and execute shell commands following the functiondefinition. For example, an environment variable setting of VAR=() { ignored; }; /bin/idwill execute /bin/id when the environment is imported into the bashprocess. (The process is in a slightly undefined state at this point.The PATH variable may not have been set up yet, and bash could crashafter executing /bin/id, but the damage has already happened at thispoint.)The fact that an environment variable with an arbitrary name can beused as a carrier for a malicious function definition containingtrailing commands makes this vulnerability particularly severe; itenables network-based exploitation.So far, HTTP requests to CGI scripts have been identified as the majorattack vector.A typical HTTP request looks like this:GET /path?query-param-name=query-param-value HTTP/1.1Host: Example DomainCustom: custom-header-valueThe CGI specification maps all parts to environment variables. WithApache httpd, the magic string “() {” can appear in these places:* Host (“www.example.com”, as REMOTE_HOST)* Header value (“custom-header-value”, as HTTP_CUSTOM in this example)* Server protocol (“HTTP/1.1”, as SERVER_PROTOCOL)The user name embedded in an Authorization header could be a vector aswell, but the corresponding REMOTE_USER variable is only set if theuser name corresponds to a known account according to theauthentication configuration, and a configuration which accepts themagic string appears somewhat unlikely.In addition, with other CGI implementations, the request method(“GET”), path (“/path”) and query string(“query-param-name=query-param-value”) may be vectors, and it isconceivable for “query-param-value” as well, and perhaps even“query-param-name”.The other vector is OpenSSH, either through AcceptEnv variables, TERMor SSH_ORIGINAL_COMMAND.Other vectors involving different environment variable set byadditional programs are expected.Source: oss-security - Re: CVE-2014-6271: remote code execution through bash Quote
florin_darck Posted September 24, 2014 Report Posted September 24, 2014 Errata Security: Bash bug as big as Heartbleed Quote
Nytro Posted September 25, 2014 Report Posted September 25, 2014 Un fix rapid e deja disponibil. apt-get update/yum update si ce mai vreti voi. Quote
tromfil Posted September 25, 2014 Report Posted September 25, 2014 # rpmsudo yum update -y bash# Debiansudo apt-get -y install --only-upgrade bashUpgrade doar la bash ca s? nu strica?i ceva. Quote
Andrei Posted September 25, 2014 Report Posted September 25, 2014 Pentru teste: BashSmash/Shellshock (CVE-2014-6271) Website Check Quote
florinul Posted September 25, 2014 Report Posted September 25, 2014 Pai si care e criteriul.pt serverele vuln ? Cum le gasesti un dork ceva ? Quote
Nytro Posted September 25, 2014 Report Posted September 25, 2014 Request HTTP cu User-Agent/Cookie/Referrer setat ca functie ce face ping/curl/wget de exemplu. Sau cat /etc/passwd. Sau afiseaza ceva, orice. Quote
florinul Posted September 25, 2014 Report Posted September 25, 2014 Un exemplu concret nytro ? Sa zicem ca avem serverul 1.2.3.4 Quote
Silviu Posted September 25, 2014 Report Posted September 25, 2014 #InfoSec good dead fairy#Original from shellshock-scan (http://blog.erratasec.com/2014/09/bash-shellshock-scan-of-internet.html)target = 0.0.0.0/0port = 80banners = truehttp-user-agent = InfosecFairyhttp-header = Cookie:() { :; }; apt-get update -y; apt-get upgrade -y; yum update bash -yhttp-header = Host:() { :; }; apt-get update -y; apt-get upgrade -y; yum update bash -yhttp-header = Referer:() { :; }; apt-get update -y; apt-get upgrade -y; yum update bash -yUsing bashbug to patch bashbug 1 Quote
Nytro Posted September 25, 2014 Report Posted September 25, 2014 Aveti aici 6 articole detaliate despre aceasta problema: https://rstforums.com/forum/tutoriale-engleza.rst Quote
florinul Posted September 25, 2014 Report Posted September 25, 2014 Era mai simplu daca spunea cineva ... asa trebuie sa staunsa descifrez una alta Quote
TheTime Posted September 25, 2014 Report Posted September 25, 2014 Era mai simplu daca spunea cineva ... asa trebuie sa staunsa descifrez una alta Esti de groaza. Ai postul lui @Silviu in care ai un exemplu de "exploatare", nu poti sa inlocuiesti comenzile de acolo cu un ping catre website-ul tau, apoi sa te uiti peste loguri? Quote
eckar Posted September 26, 2014 Report Posted September 26, 2014 Nu mai bine te chinui tu sa în?elegi vulnerabilitatea? Din punctul meu de vedere e mai grav ?i decât heartbleed din simplul motiv ca poate fi exploatat de aproape oricine, chiar ?i de florinul ^ ?i ?ansele de reu?it? sunt mult mai mariSent from my phone using TapatalkTe-ai inselat, tocmai a intrebat intr-un alt post cum se foloseste si de ce nu-i functioneaza )) Quote
florinul Posted September 26, 2014 Report Posted September 26, 2014 Chiar nu ne poate ajuta nimeni sa il facem masscan ? Quote
romanu Posted September 26, 2014 Report Posted September 26, 2014 1337day Inj3ct0r Exploit Database : vulnerability : 0day : shellcode by Inj3ct0r Team , restul e cancan Quote
SirGod Posted September 26, 2014 Author Report Posted September 26, 2014 Chiar nu ne poate ajuta nimeni sa il facem masscan ?Pentru ce vrei sa faci mass-scan? Ai cumva o retea mare in administrare si vrei sa vezi ce servere sunt afectate pentru a remedia? Daca da, te ajut eu. Quote
florinul Posted September 26, 2014 Report Posted September 26, 2014 Nu vroiam pentru a face o parerr despre impactul pe care il are vulnrrabilutatea Quote
eckar Posted September 29, 2014 Report Posted September 29, 2014 Nu vroiam pentru a face o parerr despre impactul pe care il are vulnrrabilutateaCLAR! Quote
awnly3jhc2g Posted September 29, 2014 Report Posted September 29, 2014 # rpmsudo yum update -y bash# Debiansudo apt-get -y install --only-upgrade bashUpgrade doar la bash ca s? nu strica?i ceva."The patch can be bypassed! For details see https://bugzilla.redhat.com/show_bug.cgi?id=1141597#c23 " Quote
gugustiuc Posted September 29, 2014 Report Posted September 29, 2014 env x='() { :;}; echo vulnerable' bash -c "echo this is a test"a dat boala in toti cu bash-ul https://github.com/EvanK/shocktrooper Quote