exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/42938
This Metasploit module exploits CVE-2014-6271 (Shellshock) in Qmail by injecting malicious environment variables via the SMTP MAIL FROM field, leading to remote code execution if /bin/sh is linked to Bash.
Classification
Working Poc 100%
Target:
Qmail (qmail-1.03, netqmail-1.06)
No auth needed
Prerequisites:
Vulnerable Bash version · /bin/sh linked to Bash · Valid recipient email address
exploitdb
WORKING POC
VERIFIED
by Hacker Fantastic · pythonlocallinux
https://www.exploit-db.com/exploits/40938
This exploit leverages CVE-2014-6271 (Shellshock) to achieve remote code execution on RedStar OS 3.0 Server's BEAM and RSSMON services. It sends a maliciously crafted User-Agent header to trigger the vulnerability, resulting in a reverse shell or command execution as root.
Classification
Working Poc 95%
Target:
RedStar OS 3.0 Server (BEAM & RSSMON)
No auth needed
Prerequisites:
Network access to the target service (port 10000-65535) · Vulnerable version of RedStar OS 3.0 with BEAM/RSSMON exposed
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotecgi
https://www.exploit-db.com/exploits/39918
This Metasploit module exploits CVE-2014-6271 (Shellshock) in IPFire's web interface by injecting a malicious environment variable via HTTP headers, leading to remote command execution. It includes authentication handling and version checking for IPFire <= 2.15 Update Core 82.
Classification
Working Poc 100%
Target:
IPFire <= 2.15 Update Core 82
Auth required
Prerequisites:
Network access to target · Valid credentials for IPFire web interface
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotecgi
https://www.exploit-db.com/exploits/38849
This Metasploit module exploits CVE-2014-6271 (Shellshock) by injecting malicious environment variables via the User-Agent header in HTTP requests to the 'ping.sh' CGI script on Advantech switches running Boa web server. It achieves remote command execution by leveraging the Bash vulnerability.
Classification
Working Poc 100%
Target:
Advantech Switch Boa Web Server (firmware version 1322_D1.98)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Bash (CVE-2014-6271) · Target must have the 'ping.sh' CGI script accessible via Boa web server
exploitdb
WORKING POC
by Hacker Fantastic · pythonremotehardware
https://www.exploit-db.com/exploits/40619
This exploit leverages CVE-2014-6271 (Shellshock) to achieve remote code execution on TrendMicro InterScan Web Security Virtual Appliance by sending a maliciously crafted User-Agent header to the vulnerable CGI script `/cgi-bin/cgiCmdNotify`. It requires prior authentication to the admin interface and spawns a reverse shell to a specified IP and port.
Classification
Working Poc 95%
Target:
TrendMicro InterScan Web Security Virtual Appliance (with vulnerable Bash)
Auth required
Prerequisites:
Valid admin credentials for the target appliance · Network access to the target · Vulnerable Bash version (Shellshock)
exploitdb
WRITEUP
by Bernhard Mueller · textwebappsmultiple
https://www.exploit-db.com/exploits/37816
This advisory details multiple vulnerabilities in Cisco Unified Communications Manager, including Shellshock command injection, Local File Inclusion, unauthenticated ping access, and a magic session ID bypass. It provides technical descriptions and example commands but does not include functional exploit code.
Classification
Writeup 100%
Target:
Cisco Unified Communications Manager <9.2, <10.5.2, <11.0.1
Auth required
Prerequisites:
valid user account for some exploits · network access to the target
exploitdb
WORKING POC
by hobbily plunt · textremotelinux
https://www.exploit-db.com/exploits/34879
This exploit leverages the ShellShock vulnerability (CVE-2014-6271) in OpenVPN's authentication script to execute arbitrary commands via environment variables, resulting in a reverse shell. The PoC demonstrates how a malicious client can exploit the vulnerability by injecting a payload into the username and password fields during authentication.
Classification
Working Poc 100%
Target:
OpenVPN 2.2.29
No auth needed
Prerequisites:
OpenVPN server with vulnerable version · Server configured to use external authentication script · Network access to the OpenVPN server
nomisec
WORKING POC
228 stars
by opsxcq · remote
https://github.com/opsxcq/exploit-CVE-2014-6271
This repository contains a functional exploit for CVE-2014-6271 (Shellshock), including a Docker-based vulnerable environment and scripts to demonstrate remote code execution via crafted HTTP headers targeting CGI-based web servers.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3.25)
No auth needed
Prerequisites:
Docker (for vulnerable environment) · Target system with vulnerable Bash version · CGI-enabled web server
nomisec
SCANNER
45 stars
by scottjpack · remote
https://github.com/scottjpack/shellshock_scanner
This repository contains a Python scanner for detecting CVE-2014-6271 (ShellShock) vulnerabilities. It sends crafted HTTP requests with malicious User-Agent headers to target IPs and listens for callbacks to confirm vulnerability.
Classification
Scanner 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
List of target IP addresses · Publicly accessible server to receive callbacks
nomisec
WORKING POC
22 stars
by hmlio · poc
https://github.com/hmlio/vaas-cve-2014-6271
This repository provides a Docker container with a vulnerable version of Bash (CVE-2014-6271, Shellshock) and a web application to demonstrate the exploit. The PoC includes a CGI script that can be triggered via a maliciously crafted User-Agent header to achieve remote command execution.
Classification
Working Poc 100%
Target:
Bash 4.2:2b:dfsg-0.1
No auth needed
Prerequisites:
Docker · Network access to the target
nomisec
WORKING POC
15 stars
by b4keSn4ke · remote
https://github.com/b4keSn4ke/CVE-2014-6271
This repository contains a Python-based exploit for CVE-2014-6271 (Shellshock), which targets vulnerable Bash versions (< 4.3) via HTTP headers in CGI scripts. The exploit sends a reverse shell payload through multiple headers (User-Agent, Cookie, Referer) and supports both HTTP and HTTPS with various TLS versions.
Classification
Working Poc 95%
Target:
Bash < 4.3 (via mod_cgi scripts on HTTP servers)
No auth needed
Prerequisites:
Vulnerable Bash version (< 4.3) · Accessible CGI script or directory on target web server · Network connectivity to target
nomisec
WORKING POC
13 stars
by cj1324 · poc
https://github.com/cj1324/CGIShell
This repository contains a Python-based exploit for CVE-2014-6271 (Shellshock), which leverages the vulnerability in Bash via CGI scripts to achieve remote command execution. The PoC provides an interactive shell-like interface to execute commands on the target system.
Classification
Working Poc 95%
Target:
Bash (versions affected by Shellshock)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · CGI script accessible via HTTP
nomisec
WORKING POC
12 stars
by francisck · remote
https://github.com/francisck/shellshock-cgi
This Python script tests for CVE-2014-6271 (Shellshock) by sending a maliciously crafted User-Agent header to CGI scripts on a target server. It listens for UDP callbacks to confirm vulnerability.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Network access to the target server · Target server must be able to initiate outbound UDP connections to the attacker's listening IP
nomisec
SCANNER
11 stars
by indiandragon · remote
https://github.com/indiandragon/Shellshock-Vulnerability-Scan
This is an Android app designed to scan for the Shellshock vulnerability (CVE-2014-6271) by executing a command that checks if the system's bash is vulnerable. It does not exploit the vulnerability but merely detects its presence.
Classification
Scanner 90%
Target:
Bash (versions vulnerable to CVE-2014-6271)
No auth needed
Prerequisites:
Android device with access to execute shell commands
nomisec
SCANNER
6 stars
by P0cL4bs · remote
https://github.com/P0cL4bs/ShellShock-CGI-Scan
This repository contains a C-based scanner for CVE-2014-6271 (ShellShock), which checks if CGI scripts are vulnerable by sending a crafted User-Agent header and listening for responses on a specified port. It includes a bind server to capture responses from vulnerable systems.
Classification
Scanner 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
List of target sites in a file · Local IP and port for listening
nomisec
WRITEUP
6 stars
by npm · poc
https://github.com/npm/ansible-bashpocalypse
This repository provides an Ansible playbook to patch systems against CVE-2014-6271 (Shellshock), a critical remote code execution vulnerability in Bash. It does not contain exploit code but rather a remediation script.
Classification
Writeup 90%
Target:
Bash (versions up to 4.3)
Auth required
Prerequisites:
Ansible installed on local host · Inventory file with target servers
nomisec
WORKING POC
5 stars
by J0hnTh3Kn1ght · poc
https://github.com/J0hnTh3Kn1ght/CVE-2014-6271
This repository contains a Python script that exploits CVE-2014-6271 (Shellshock), a remote command execution vulnerability in Bash. The script sends a malicious User-Agent header to a target URL, triggering the vulnerability to spawn a reverse shell.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · CGI-enabled web server (e.g., Apache with mod_cgi) · Network connectivity to the target
nomisec
WORKING POC
4 stars
by akr3ch · remote
https://github.com/akr3ch/CVE-2014-6271
This exploit leverages CVE-2014-6271 (Shellshock) by injecting a malicious User-Agent header to execute arbitrary commands on a vulnerable Bash shell via a CGI script. It provides an interactive shell-like interface to send commands and display responses.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · CGI script accessible via HTTP
nomisec
WORKING POC
4 stars
by zalalov · remote
https://github.com/zalalov/CVE-2014-6271
This PoC exploits CVE-2014-6271 (Shellshock) by sending a maliciously crafted HTTP request with a reverse shell payload in the headers to a vulnerable CGI script. The payload leverages the Bash environment variable injection flaw to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script · Network connectivity to target
nomisec
WORKING POC
4 stars
by securusglobal · poc
https://github.com/securusglobal/BadBash
This is a functional PoC exploit for CVE-2014-6271 (ShellShock), targeting vulnerable CGI scripts via HTTP headers. It checks for vulnerability by injecting a sleep command and exploits it by triggering a reverse shell via netcat.
Classification
Working Poc 95%
Target:
Bash (versions with ShellShock vulnerability)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script accessible via HTTP
nomisec
WORKING POC
3 stars
by 0x00-0x00 · remote
https://github.com/0x00-0x00/CVE-2014-6271
This repository contains a Python script that exploits CVE-2014-6271 (Shellshock) to upload and execute arbitrary payloads on a vulnerable server. It supports chunked uploads and base64 encoding to bypass size limitations.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Vulnerable CGI script accessible via HTTP · Network access to the target server
nomisec
WORKING POC
3 stars
by akiraaisha · remote
https://github.com/akiraaisha/shellshocker-python
This is a Python-based exploit for CVE-2014-6271 (Shellshock), designed to test and exploit vulnerable systems by sending crafted HTTP requests to execute arbitrary commands via Bash environment variables.
Classification
Working Poc 90%
Target:
Bash (versions prior to the fix for CVE-2014-6271)
No auth needed
Prerequisites:
Python 2.7 · mechanize library · network access to target
nomisec
WORKING POC
3 stars
by sch3m4 · poc
https://github.com/sch3m4/RIS
This is a functional exploit for CVE-2014-6271 (Shellshock), which leverages a vulnerability in Bash to achieve remote command execution via crafted HTTP headers. The script establishes an interactive shell by injecting commands into vulnerable CGI scripts.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script that uses environment variables
nomisec
WORKING POC
2 stars
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOIT
This is a functional exploit for CVE-2014-6271 (Shellshock), which leverages the Bash vulnerability to execute arbitrary commands via crafted HTTP headers. It includes both scanning and exploitation capabilities, with support for reverse shell payloads.
Classification
Working Poc 95%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · Network access to the target · Open port for reverse shell listener
nomisec
WORKING POC
2 stars
by ramnes · remote
https://github.com/ramnes/pyshellshock
This repository contains a Python-based exploit for CVE-2014-6271 (Shellshock), which allows remote command execution via crafted HTTP headers targeting vulnerable Bash versions. It includes functions to test vulnerability, execute commands, and spawn reverse shells.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script or HTTP service using Bash
nomisec
WORKING POC
2 stars
by RainMak3r · poc
https://github.com/RainMak3r/Rainstorm
This is a functional exploit PoC for CVE-2014-6271 (Shellshock), which checks for vulnerability by injecting a sleep command via the User-Agent header and exploits it to spawn a reverse shell using netcat.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · Network access to the target's CGI endpoint
nomisec
WORKING POC
1 stars
by im2nerd · remote
https://github.com/im2nerd/CVE-2014-6271
This repository contains a functional Python exploit for CVE-2014-6271 (Shellshock), which leverages HTTP environment variable injection to execute arbitrary commands on vulnerable Bash-based CGI scripts. The exploit uses a crafted User-Agent header to inject a payload that spawns a shell and executes user-provided commands.
Classification
Working Poc 100%
Target:
Bash (versions prior to the Shellshock patch)
No auth needed
Prerequisites:
Vulnerable Bash version · CGI script that passes HTTP headers to Bash
nomisec
WORKING POC
1 stars
by RadYio · remote
https://github.com/RadYio/CVE-2014-6271
This repository contains a functional PoC for CVE-2014-6271 (Shellshock), demonstrating remote code execution via maliciously crafted environment variables in Bash. It includes a Dockerized vulnerable environment and scripts to exploit the vulnerability for defacement or arbitrary command execution.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Docker installed · Vulnerable Bash version · CGI script exposed on target
nomisec
WORKING POC
1 stars
by TheRealCiscoo · remote
https://github.com/TheRealCiscoo/Shellshock-Exploit
This exploit abuses the Shellshock vulnerability (CVE-2014-6271) in Bash versions 1.14 to 4.3 by injecting a malicious User-Agent header to execute a reverse shell. It requires a listener on the attacker's machine to receive the shell.
Classification
Working Poc 95%
Target:
Bash versions 1.14 to 4.3
No auth needed
Prerequisites:
Target with vulnerable Bash version · Network access to the target · Listener set up on attacker's machine
nomisec
WORKING POC
1 stars
by 0xN7y · remote
https://github.com/0xN7y/CVE-2014-6271
This is a Python script that exploits CVE-2014-6271 (Shellshock) by sending a crafted User-Agent header to execute arbitrary commands on a vulnerable system. The script uses the requests library to send an HTTP GET request with the malicious payload.
Classification
Working Poc 95%
Target:
GNU Bash through 4.3
No auth needed
Prerequisites:
Target system must be running a vulnerable version of Bash · Target system must expose a CGI script or similar interface that uses environment variables
nomisec
WORKING POC
1 stars
by Gurguii · remote
https://github.com/Gurguii/cgi-bin-shellshock
This repository contains a PoC for CVE-2014-6271 (Shellshock), providing both Python and Bash scripts to exploit the vulnerability via crafted User-Agent headers. It supports RCE and reverse shell functionality.
Classification
Working Poc 100%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Target system with CGI-bin exposed
nomisec
WORKING POC
1 stars
by mochizuki875 · poc
https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian
This repository provides a Docker-based PoC environment for CVE-2014-6271 (Shellshock), demonstrating remote code execution via a maliciously crafted User-Agent header in a CGI script. The exploit triggers a reverse shell to an attacker-controlled host.
Classification
Working Poc 95%
Target:
Apache HTTP Server with mod_cgi (Debian-based systems)
No auth needed
Prerequisites:
Docker/Kubernetes environment · Network access to the target · Vulnerable CGI script
nomisec
WRITEUP
1 stars
by somhm-solutions · poc
https://github.com/somhm-solutions/Shell-Shock
This repository contains a README.md file describing the Shell Shock vulnerability (CVE-2014-6271), including exploitation vectors and payload examples. It does not include actual exploit code but provides technical details for privilege escalation and remote code execution via Bash shell vulnerabilities.
Classification
Writeup 90%
Target:
Unix Bash Shell (various versions)
No auth needed
Prerequisites:
Vulnerable Bash shell version · Ability to send crafted environment variables or HTTP headers
nomisec
WORKING POC
1 stars
by Any3ite · remote
https://github.com/Any3ite/CVE-2014-6271
This Go-based PoC exploits CVE-2014-6271 (Shellshock) by sending a maliciously crafted HTTP request with a User-Agent header containing a Bash function definition followed by arbitrary command execution. The exploit targets vulnerable CGI scripts and executes the command provided as an argument.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script on target
nomisec
WORKING POC
1 stars
by Anklebiter87 · poc
https://github.com/Anklebiter87/Cgi-bin_bash_Reverse
This PoC exploits CVE-2014-6271 (Shellshock) by sending a maliciously crafted HTTP request with a reverse shell payload in the headers. It leverages the vulnerability in Bash to execute arbitrary commands, resulting in remote code execution.
Classification
Working Poc 95%
Target:
GNU Bash through 4.3
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script that uses Bash
nomisec
SCANNER
1 stars
by sunnyjiang · poc
https://github.com/sunnyjiang/shellshocker-android
This is an Android application designed to test for the Shellshock vulnerability (CVE-2014-6271) by sending a crafted User-Agent header to a target server. It allows users to input a target URL and a command to test for vulnerability.
Classification
Scanner 90%
Target:
Bash (versions vulnerable to CVE-2014-6271)
No auth needed
Prerequisites:
A target server running a vulnerable version of Bash · Network connectivity to the target server
nomisec
SCANNER
1 stars
by ryeyao · remote
https://github.com/ryeyao/CVE-2014-6271_Test
This repository contains a Python script to test for CVE-2014-6271 (Shellshock) by sending crafted HTTP requests to CGI-enabled servers and checking for vulnerability indicators in responses. It includes functionality to collect URLs from Google search results or a file, and test them for the vulnerability.
Classification
Scanner 90%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
CGI-enabled web server · Access to target URLs or Google search results
nomisec
SCANNER
1 stars
by gabemarshall · poc
https://github.com/gabemarshall/shocknaww
This repository contains a Python script to check for CVE-2014-6271 (Shellshock) by sending a crafted User-Agent header with a sleep command and measuring the response time delay. It includes a sample vulnerable CGI script for testing purposes.
Classification
Scanner 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Target system with a vulnerable version of Bash · Exposed CGI script or service that invokes Bash
nomisec
SCANNER
1 stars
by proclnas · remote
https://github.com/proclnas/ShellShock-CGI-Scan
This repository contains a C-based scanner for CVE-2014-6271 (ShellShock), which checks if CGI scripts are vulnerable by sending a crafted User-Agent header and listening for responses on a specified port. It does not execute a reverse shell but instead exfiltrates system information via a TCP connection.
Classification
Scanner 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
List of target URLs · Network connectivity to targets · Local IP and port for listening
nomisec
SCANNER
1 stars
by themson · remote
https://github.com/themson/shellshock
This repository contains a Python script that monitors DHCP frames for potentially malicious characters associated with the Shellshock vulnerability (CVE-2014-6271). It logs offending frames to a PCAP file and highlights them in the output.
Classification
Scanner 100%
Target:
DHCP servers/clients
No auth needed
Prerequisites:
Network access to monitor DHCP traffic · Python with Scapy library
nomisec
WORKING POC
1 stars
by APSL · poc
https://github.com/APSL/salt-shellshock
This repository provides a SaltStack formula to mitigate CVE-2014-6271 (Shellshock) by upgrading Bash via OS packages or compiling a patched version. It includes a script to download, patch, and install Bash 4.3 with all available patches.
Classification
Working Poc 90%
Target:
Bash (versions vulnerable to CVE-2014-6271)
Auth required
Prerequisites:
Access to a vulnerable system with Bash · SaltStack or manual execution privileges
nomisec
SCANNER
by kaleth4 · poc
https://github.com/kaleth4/CVE-2014-6271
This repository contains a scanner for CVE-2014-6271 (Shellshock) that checks for vulnerable CGI directories and allows running commands on found URLs. It includes proxy support and directory scanning capabilities.
Classification
Scanner 90%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Target with exposed CGI directory · Network access to the target
nomisec
WRITEUP
by kaleth4 · poc
https://github.com/kaleth4/-CVE-2014-6271
This repository provides a detailed technical analysis of CVE-2014-6271 (Shellshock), including root cause, exploitation vectors, and mitigation steps. It includes PoC commands and reverse shell payloads but does not contain functional exploit code.
Classification
Writeup 100%
Target:
GNU Bash 1.0.3-4.3
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI scripts or environment variable injection vectors
nomisec
WRITEUP
by ambjlou · poc
https://github.com/ambjlou/it355-lab4-enterprise-lan-security
This repository contains a detailed technical writeup and lab documentation for CVE-2014-6271 (Shellshock), including network infrastructure analysis, exploitation evidence, and remediation steps. It provides a comprehensive walkthrough of the vulnerability's impact and mitigation in an enterprise LAN environment.
Classification
Writeup 95%
Target:
GNU Bash (versions prior to patched releases)
No auth needed
Prerequisites:
Vulnerable Bash version · Access to a web server with CGI scripts
nomisec
WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2014-6271
The repository contains a functional Python-based exploit for CVE-2014-6271 (Shellshock), which leverages a flaw in GNU Bash's environment variable parsing to achieve remote code execution. The exploit sends a crafted payload via HTTP headers (e.g., User-Agent) to trigger command execution on vulnerable systems.
Classification
Working Poc 95%
Target:
GNU Bash ≤ 4.3 (before patch level 30)
No auth needed
Prerequisites:
A vulnerable system with exposed CGI scripts or services that pass environment variables to Bash
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2014-6271
This repository contains a functional Python-based exploit for CVE-2014-6271 (Shellshock), demonstrating remote code execution via crafted environment variables in GNU Bash. The PoC includes a detailed technical breakdown and a working script to test and exploit the vulnerability.
Classification
Working Poc 95%
Target:
GNU Bash ≤ 4.3 (before patch level 30)
No auth needed
Prerequisites:
A vulnerable GNU Bash installation · A target system exposing environment variables (e.g., via CGI, DHCP, SSH)
nomisec
WORKING POC
by Industri4l-H3ll-Xpl0it3rs · remote
https://github.com/Industri4l-H3ll-Xpl0it3rs/CVE-2014-6271-Shellshock
This repository contains a functional exploit for CVE-2014-6271 (Shellshock), which leverages a vulnerability in Bash to execute arbitrary commands via crafted HTTP headers. The script uses `curl` to send a malicious `user-agent` header to a target CGI script, triggering remote code execution.
Classification
Working Poc 100%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · Exposed CGI script accessible via HTTP
nomisec
WORKING POC
by mtaha-sec · poc
https://github.com/mtaha-sec/bash-apocalypse
This repository contains a functional exploit for CVE-2014-6271 (Shellshock), a critical RCE vulnerability in Bash. The exploit leverages environment variable manipulation via HTTP headers to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
Bash (versions before 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · CGI-enabled web server · Exposed HTTP endpoint
nomisec
WORKING POC
by DrHaitham · poc
https://github.com/DrHaitham/CVE-2014-6271-Shellshock-
This repository provides a comprehensive guide and proof-of-concept for exploiting CVE-2014-6271 (Shellshock), a critical remote code execution vulnerability in Bash. It includes detailed steps for setting up a vulnerable environment, executing arbitrary commands via crafted HTTP headers, and obtaining a reverse shell.
Classification
Working Poc 100%
Target:
Bash (versions before 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · CGI-enabled web server · Network access to target
github
WRITEUP
by OscarYR · poc
https://github.com/OscarYR/CVE_Reproduction/tree/main/Shellshock/CVE-2014-6271.md
This repository provides a detailed technical analysis and reproduction steps for CVE-2014-6271 (Shellshock), including a Docker-based test environment, exploit examples, and mitigation strategies. It demonstrates the vulnerability through crafted environment variables and HTTP headers in a CGI context.
Classification
Writeup 100%
Target:
GNU Bash (versions < 4.3)
No auth needed
Prerequisites:
GNU Bash < 4.3 · Apache with CGI enabled · Vulnerable CGI script
nomisec
WRITEUP
by RAJMadhusankha · poc
https://github.com/RAJMadhusankha/Shellshock-CVE-2014-6271-Exploitation-and-Analysis
This repository is a writeup documenting the exploitation and analysis of the Shellshock vulnerability (CVE-2014-6271) using Metasploit and Nmap in a controlled lab environment. It includes steps for scanning, exploiting, and post-exploitation commands.
Classification
Writeup 100%
Target:
GNU Bash (versions 1.14–4.3)
No auth needed
Prerequisites:
Vulnerable GNU Bash version · Access to a CGI script via HTTP headers
nomisec
WORKING POC
by rsherstnev · remote
https://github.com/rsherstnev/CVE-2014-6271
This Python script exploits CVE-2014-6271 (ShellShock) by injecting malicious environment variables via HTTP headers (User-Agent, Referer, Cookie) to achieve remote command execution on vulnerable systems. It includes both a vulnerability check and an interactive shell for command execution.
Classification
Working Poc 95%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · Network access to the target's web server
nomisec
WORKING POC
by knightc0de · remote
https://github.com/knightc0de/Shellshock_vuln_Exploit
This is a functional Python exploit for CVE-2014-6271 (Shellshock), which leverages environment variable injection in GNU Bash to achieve remote code execution via crafted HTTP headers targeting CGI scripts. It includes a reverse shell handler and supports HTTP/HTTPS, custom CGI paths, and proxy usage.
Classification
Working Poc 100%
Target:
GNU Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Vulnerable CGI script accessible via HTTP/HTTPS · Network connectivity to the target · Attacker-controlled listener for reverse shell
nomisec
SCANNER
by moften · remote
https://github.com/moften/CVE-2014-6271
This is a Python-based scanner for CVE-2014-6271 (Shellshock) that checks for vulnerability by sending a crafted User-Agent header to common CGI paths. It does not execute a reverse shell or other offensive payloads, only checks for the presence of the vulnerability.
Classification
Scanner 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Target server with exposed CGI scripts · Bash vulnerable to Shellshock
nomisec
WORKING POC
by YunchoHang · remote
https://github.com/YunchoHang/CVE-2014-6271-SHELLSHOCK
This Python script exploits CVE-2014-6271 (Shellshock) to execute arbitrary commands or establish a reverse shell on vulnerable systems via crafted HTTP headers. It uses curl to send malicious payloads to a target CGI script.
Classification
Working Poc 95%
Target:
Bash (versions before 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · CGI-enabled web server · Network access to target
nomisec
WORKING POC
by AlissonFaoli · remote
https://github.com/AlissonFaoli/Shellshock
This repository contains a Python-based exploit for CVE-2014-6271 (Shellshock), which targets vulnerable Unix-based systems via maliciously crafted HTTP headers to achieve remote code execution. The exploit establishes a reverse shell by leveraging the Bash vulnerability in CGI scripts.
Classification
Working Poc 95%
Target:
GNU Bash 1.14 to 4.3
No auth needed
Prerequisites:
Vulnerable CGI script endpoint · Network access to the target · Python 3.x
nomisec
SCANNER
by ajansha · remote
https://github.com/ajansha/shellshock
This repository contains a Bash script scanner for detecting Shellshock vulnerabilities (CVE-2014-6271 and CVE-2014-7169) by sending crafted HTTP headers to a target URL and analyzing the response.
Classification
Scanner 95%
Target:
Bash (versions vulnerable to Shellshock)
No auth needed
Prerequisites:
Target URL with a vulnerable Bash environment
nomisec
WORKING POC
by hanmin0512 · poc
https://github.com/hanmin0512/CVE-2014-6271_pwnable
This repository contains a working PoC for CVE-2014-6271 (Shellshock), demonstrating how environment variables can be manipulated to execute arbitrary commands in Bash. The provided C code elevates privileges and triggers the vulnerability by invoking Bash with a crafted environment variable.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Access to a vulnerable Bash environment · Ability to set environment variables
nomisec
SCANNER
by Brandaoo · remote
https://github.com/Brandaoo/CVE-2014-6271
This repository contains a Bash script that checks for the Shellshock vulnerability (CVE-2014-6271) by sending a crafted HTTP request with a malicious User-Agent header to a target site and analyzing the response for signs of vulnerability.
Classification
Scanner 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Target system with a vulnerable version of Bash · Target system exposed to HTTP requests
nomisec
WORKING POC
by mritunjay-k · remote
https://github.com/mritunjay-k/CVE-2014-6271
This PoC exploits CVE-2014-6271 (ShellShock) by sending a maliciously crafted User-Agent header to a vulnerable CGI endpoint, allowing remote command execution via Bash environment variable manipulation.
Classification
Working Poc 95%
Target:
GNU Bash through 4.3 (via CGI endpoints like Apache mod_cgi)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI endpoint (e.g., /cgi-bin/status)
nomisec
WORKING POC
by hadrian3689 · remote
https://github.com/hadrian3689/shellshock
This repository contains a Python3 script that exploits CVE-2014-6271 (Shellshock) to achieve remote code execution via a reverse shell or a pseudo-interactive shell using mkfifo for firewall evasion. The exploit leverages the vulnerability in Bash through crafted HTTP headers.
Classification
Working Poc 95%
Target:
Bash (versions with Shellshock vulnerability)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · Network access to the target system
nomisec
WORKING POC
by FilipStudeny · remote
https://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection-
This is a functional Python exploit for CVE-2014-6271 (Shellshock), which leverages the Bash environment variable injection vulnerability to achieve remote command execution via crafted HTTP headers. It supports both reverse shell and arbitrary command execution payloads.
Classification
Working Poc 95%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script on target
nomisec
WORKING POC
by anujbhan · poc
https://github.com/anujbhan/shellshock-victim-host
This repository provides a Docker container designed to be vulnerable to Shellshock (CVE-2014-6271). It includes a vulnerable CGI endpoint for testing exploits and a safe endpoint for comparison.
Classification
Working Poc 90%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Docker or Podman installed · Network access to the vulnerable endpoint
nomisec
WRITEUP
by cved-sources · poc
https://github.com/cved-sources/cve-2014-6271
This repository is a README file referencing CVE-2014-6271 (Shellshock) and provides links to related tools and vulnerable Docker containers. It does not contain exploit code but serves as documentation for managing vulnerable environments.
Classification
Writeup 90%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Access to a vulnerable Bash environment
nomisec
WORKING POC
by MuirlandOracle · remote
https://github.com/MuirlandOracle/CVE-2014-6271-IPFire
This is a Python-based exploit for CVE-2014-6271 (ShellShock) targeting IPFire systems <= 2.15. It leverages the vulnerability in Bash via HTTP headers to achieve remote code execution, including a pseudo-shell and reverse shell functionality.
Classification
Working Poc 95%
Target:
IPFire <= 2.15
Auth required
Prerequisites:
Network access to the target · Valid credentials if HTTP Basic Auth is enabled · Bash vulnerability (ShellShock) present on the target
nomisec
WORKING POC
by cyberharsh · poc
https://github.com/cyberharsh/Shellbash-CVE-2014-6271
This repository provides a Docker-based vulnerable environment to demonstrate CVE-2014-6271 (Shellshock), a remote command injection vulnerability in Bash. It includes a vulnerable CGI script (victim.cgi) and a safe one (safe.cgi) to compare behavior when exploiting the vulnerability via the User-Agent header.
Classification
Working Poc 90%
Target:
Bash 4.3 (and earlier versions)
No auth needed
Prerequisites:
Docker · Docker Compose · Network access to the target
nomisec
STUB
by Dilith006 · poc
https://github.com/Dilith006/CVE-2014-6271
The repository contains only a README.md file with a CVE identifier and no functional exploit code or technical details. It appears to be a placeholder or stub.
Target:
unspecified
No auth needed
nomisec
WRITEUP
by rashmikadileeshara · poc
https://github.com/rashmikadileeshara/CVE-2014-6271-Shellshock-
This repository contains only a README file with no exploit code or technical details, indicating it is likely a placeholder or writeup for an assignment related to CVE-2014-6271 (Shellshock).
Classification
Writeup 90%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version
nomisec
WORKING POC
by shawntns · remote
https://github.com/shawntns/exploit-CVE-2014-6271
This repository contains a functional exploit for CVE-2014-6271 (Shellshock), leveraging a vulnerable CGI entry point to achieve remote command execution via crafted HTTP headers. The scripts demonstrate both arbitrary command execution and a defacement scenario.
Classification
Working Poc 95%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script on target
nomisec
WORKING POC
by Aruthw · poc
https://github.com/Aruthw/CVE-2014-6271
This repository contains two Python scripts demonstrating CVE-2014-6271 (Shellshock), a remote code execution vulnerability in Bash via malformed environment variables. The scripts exploit vulnerable CGI endpoints to execute arbitrary commands or spawn reverse shells.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI endpoint
nomisec
WORKING POC
by w4fz5uck5 · remote
https://github.com/w4fz5uck5/ShockZaum-CVE-2014-6271
This is a functional exploit for CVE-2014-6271 (Shellshock), which leverages a vulnerability in Bash to execute arbitrary commands via crafted HTTP headers. The PoC sends a malicious User-Agent header to a target CGI script, triggering remote code execution.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Target system with vulnerable Bash version · Exposed CGI script that processes User-Agent headers
nomisec
WORKING POC
by kowshik-sundararajan · poc
https://github.com/kowshik-sundararajan/CVE-2014-6271
This repository contains a working proof-of-concept for CVE-2014-6271 (Shellshock), demonstrating the vulnerability in GNU Bash through 4.3. It includes a setup script that installs vulnerable versions of Bash, Apache, and PHP CGI, then exploits the vulnerability to leak /etc/passwd.
Classification
Working Poc 95%
Target:
GNU Bash through 4.3, Apache 2.2.22, PHP CGI
No auth needed
Prerequisites:
root access · Ubuntu 14.04 LTS or similar environment · network access to download vulnerable packages
nomisec
SCANNER
by ilismal · poc
https://github.com/ilismal/Nessus_CVE-2014-6271_check
This repository contains a Nessus .audit file designed to check for the presence of CVE-2014-6271 (Shellshock) vulnerability in Bash. It is a detection tool rather than an exploit, aiming to identify vulnerable systems.
Classification
Scanner 90%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Access to a Nessus scanner · Network access to target systems
nomisec
WORKING POC
by Pilou-Pilou · poc
https://github.com/Pilou-Pilou/docker_CVE-2014-6271.
This repository provides a Dockerized environment to exploit CVE-2014-6271 (Shellshock), demonstrating remote code execution via a maliciously crafted HTTP User-Agent header. The PoC includes a Dockerfile and a script to run Apache, with a curl command to trigger the vulnerability.
Classification
Working Poc 90%
Target:
Apache HTTP Server with mod_cgi and vulnerable Bash versions (e.g., Bash < 4.3)
No auth needed
Prerequisites:
Docker installed · Vulnerable Bash version · Apache with mod_cgi enabled
nomisec
STUB
by huanlu · poc
https://github.com/huanlu/cve-2014-6271-huan-lu
The repository contains only a README.md file with minimal content, providing no functional exploit code or technical details for CVE-2014-6271. It appears to be a placeholder or stub.
Target:
GNU Bash (versions prior to 4.3)
No auth needed
Prerequisites:
none
nomisec
WORKING POC
by heikipikker · remote
https://github.com/heikipikker/shellshock-shell
This is a functional Python-based exploit for CVE-2014-6271 (Shellshock), which injects malicious commands via HTTP headers (User-Agent, Cookie, or Referer) to achieve remote code execution on vulnerable systems. It provides an interactive shell-like interface for executing commands on the target.
Classification
Working Poc 95%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version exposed via CGI or similar HTTP interface
nomisec
SCANNER
by teedeedubya · poc
https://github.com/teedeedubya/bash-fix-exploit
This repository provides an Ansible role to check for the presence of CVE-2014-6271 (Shellshock) vulnerability in bash and optionally apply patches on RedHat-based systems. It does not contain exploit code but serves as a detection and remediation tool.
Classification
Scanner 90%
Target:
bash (versions affected by CVE-2014-6271)
Auth required
Prerequisites:
Access to target systems with sudo privileges · Ansible installed on the control machine
nomisec
SCANNER
by renanvicente · poc
https://github.com/renanvicente/puppet-shellshock
This Puppet module scans for Shellshock vulnerability (CVE-2014-6271) by testing the bash environment variable injection. It provides a Facter fact to determine if the system is vulnerable.
Classification
Scanner 90%
Target:
Bash (versions vulnerable to Shellshock)
No auth needed
Prerequisites:
Bash installed on the target system
nomisec
WRITEUP
by u20024804 · remote
https://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271
This repository contains source code and documentation for a patched version of Bash 4.3 addressing CVE-2014-6271 (Shellshock). It includes utility scripts and miscellaneous tools but no exploit PoC.
Classification
Writeup 90%
Target:
GNU Bash 4.3
No auth needed
Prerequisites:
Access to vulnerable Bash version
nomisec
WRITEUP
by u20024804 · remote
https://github.com/u20024804/bash-4.2-fixed-CVE-2014-6271
This repository contains source code and documentation for a patched version of Bash 4.2 addressing CVE-2014-6271 (Shellshock). It includes utility scripts and miscellaneous tools but no functional exploit code.
Classification
Writeup 90%
Target:
GNU Bash 4.2
No auth needed
Prerequisites:
Access to vulnerable Bash version
nomisec
STUB
by u20024804 · remote
https://github.com/u20024804/bash-3.2-fixed-CVE-2014-6271
This repository appears to be a partial or incomplete snapshot of Bash source code, specifically targeting CVE-2014-6271 (Shellshock). However, it lacks exploit code or a clear proof-of-concept, containing only miscellaneous utility files and a README.
Target:
GNU Bash 3.2
No auth needed
Prerequisites:
Vulnerable Bash version (pre-patch for CVE-2014-6271)
nomisec
SCANNER
by 352926 · remote
https://github.com/352926/shellshock_crawler
This repository contains a Python script that scans for CVE-2014-6271 (Shellshock) by leveraging Google search to find vulnerable CGI scripts and testing them with a crafted User-Agent header to trigger the vulnerability and retrieve /etc/passwd.
Classification
Scanner 90%
Target:
Bash (versions prior to 4.3)
No auth needed
Prerequisites:
Python with 'shell' and 'google' libraries installed · Internet access to perform Google searches
nomisec
WORKING POC
by ryancnelson · poc
https://github.com/ryancnelson/patched-bash-4.3
This repository provides a patched version of Bash 4.3 to mitigate CVE-2014-6271 (Shellshock). It includes source code patches and build instructions for applying the fix, particularly targeting SmartOS environments.
Classification
Working Poc 90%
Target:
GNU Bash 4.3
No auth needed
Prerequisites:
Access to compile and install patched Bash version
nomisec
WRITEUP
by internero · poc
https://github.com/internero/debian-lenny-bash_3.2.52-cve-2014-6271
This repository provides patched Debian Lenny Bash packages for CVE-2014-6271 (Shellshock) and includes a test command to verify vulnerability. It does not contain exploit code but serves as a reference for testing and mitigation.
Classification
Writeup 90%
Target:
GNU Bash 3.2.52
No auth needed
Prerequisites:
Access to a vulnerable Bash environment
nomisec
WORKING POC
by woltage · poc
https://github.com/woltage/CVE-2014-6271
This is a simple Bash script that exploits CVE-2014-6271 (Shellshock) by injecting a malicious environment variable into a Bash process. The script demonstrates the vulnerability by executing arbitrary commands via a crafted function definition in an environment variable.
Classification
Working Poc 90%
Target:
GNU Bash up to version 4.3
No auth needed
Prerequisites:
Vulnerable version of Bash · Ability to set environment variables for the target process
nomisec
SCANNER
by villadora · remote
https://github.com/villadora/CVE-2014-6271
This repository contains a Node.js-based scanner for CVE-2014-6271 (Shellshock). It checks for vulnerable CGI scripts by injecting a crafted User-Agent header and verifying the response for a marker indicating command execution.
Classification
Scanner 90%
Target:
Bash (versions up to 4.3)
No auth needed
Prerequisites:
Access to a vulnerable CGI script · Network connectivity to the target
nomisec
SCANNER
by jblaine · remote
https://github.com/jblaine/cookbook-bash-CVE-2014-6271
This is a Chef cookbook that scans for the presence of bash installations vulnerable to CVE-2014-6271 (Shellshock). It tests specified bash executables and fails the Chef run if a vulnerable version is detected.
Classification
Scanner 100%
Target:
GNU Bash up to version 4.3
No auth needed
Prerequisites:
Access to execute commands on the target system · Chef environment to run the cookbook
nomisec
WORKING POC
by mattclegg · poc
https://github.com/mattclegg/CVE-2014-6271
This repository provides a script to test for and patch CVE-2014-6271 (Shellshock), a critical remote code execution vulnerability in Bash. The script automates the process of downloading, patching, and compiling a fixed version of Bash for macOS.
Classification
Working Poc 90%
Target:
GNU Bash versions up to 3.2.51
No auth needed
Prerequisites:
macOS system with vulnerable Bash · Internet access to download patches and source code · sudo privileges for installation
nomisec
STUB
by justzx2011 · poc
https://github.com/justzx2011/bash-up
This repository contains only a README file describing a script to fix CVE-2014-6271 (Shellshock) but does not include any actual exploit or PoC code. It appears to be a placeholder or incomplete project.
Target:
GNU Bash (versions up to 4.3)
No auth needed
nomisec
SCANNER
by rrreeeyyy · poc
https://github.com/rrreeeyyy/cve-2014-6271-spec
This repository contains a Serverspec test to detect CVE-2014-6271 (Shellshock) by checking the Bash version and testing for vulnerability via an environment variable injection. It does not exploit the vulnerability but verifies its presence.
Classification
Scanner 90%
Target:
Bash (versions before 4.3)
No auth needed
Prerequisites:
Remote or local access to a system with vulnerable Bash
nomisec
WRITEUP
by dlitz · poc
https://github.com/dlitz/bash-cve-2014-6271-fixes
This repository provides patches for CVE-2014-6271 (Shellshock) in Bash, including upstream and Debian-specific fixes. It includes SHA256 checksums for verification but does not contain exploit code.
Classification
Writeup 100%
Target:
GNU Bash (versions 1.14 through 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Ability to set environment variables
metasploit
SCANNER
by Stephane Chazelas, wvu, lcamtuf · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
This Metasploit module scans for the Shellshock vulnerability (CVE-2014-6271) by injecting malicious environment variables via HTTP headers to CGI scripts. It checks for vulnerability by comparing responses to injected and normal requests.
Classification
Scanner 100%
Target:
Apache HTTP Server with mod_cgi and Bash (versions vulnerable to Shellshock)
No auth needed
Prerequisites:
Access to a CGI script on the target Apache server · Bash as the system shell
vulncheck_xdb
WORKING POC
remote
https://github.com/Jsmoreira02/CVE-2014-6271
This repository contains a functional Python exploit for CVE-2014-6271 (Shellshock), which targets vulnerable Bash environments via HTTP headers. The exploit sends a crafted User-Agent header to execute arbitrary commands, including a reverse shell payload.
Classification
Working Poc 95%
Target:
Bash (via Apache HTTP Server with mod_cgi)
No auth needed
Prerequisites:
Target with vulnerable Bash version · Apache HTTP Server with mod_cgi enabled · Network connectivity to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/17moonup/CVE
This repository contains functional exploit code for CVE-2014-6271 (Shellshock) and CVE-2014-0160 (Heartbleed). The Shellshock PoC demonstrates remote command injection via a maliciously crafted User-Agent header, while the Heartbleed PoC includes a Python script to extract sensitive data from vulnerable OpenSSL servers.
Classification
Working Poc 95%
Target:
Bash (4.3.0) and OpenSSL (1.0.1c)
No auth needed
Prerequisites:
Docker for environment setup · Network access to the target server
vulncheck_xdb
SUSPICIOUS
remote
https://github.com/l0veormiss/l0veormiss.github.io
The repository claims to be a reverse shell generator but lacks actual exploit code for CVE-2014-6271. It contains a web-based tool for generating reverse shells and includes Docker setup, but no PoC for the specified CVE.
Classification
Suspicious 90%
Target:
N/A
No auth needed
vulncheck_xdb
WORKING POC
remote
https://github.com/darrenmartyn/VisualDoor
This repository contains a functional exploit for CVE-2014-6271 (Shellshock) targeting SonicWall SSL-VPN appliances. The exploit leverages the vulnerability in the cgi-bin/jarrewrite.sh script to achieve unauthenticated remote command execution as the 'nobody' user, with a reverse shell payload delivered via /dev/tcp.
Classification
Working Poc 100%
Target:
SonicWall SSL-VPN appliances
No auth needed
Prerequisites:
Network access to the target SonicWall SSL-VPN appliance · Python environment with 'requests' library
vulncheck_xdb
WORKING POC
remote-auth
https://github.com/threat9/routersploit
RouterSploit is an exploitation framework for embedded devices, containing modules for exploits, credential testing, scanners, and payloads. The repository includes functional exploit code for various vulnerabilities, including CVE-2014-6271 (Shellshock), with a structured development and testing environment.
Classification
Working Poc 90%
Target:
Embedded devices (routers, cameras, etc.)
No auth needed
Prerequisites:
Python 3.6+ · network access to target device
exploitdb
WORKING POC
webappsphp
https://www.exploit-db.com/exploits/35146
This exploit leverages the Shellshock vulnerability (CVE-2014-6271) in Bash to bypass PHP's disable_functions restriction and execute arbitrary commands. It uses the mail() function with a crafted environment variable to trigger the vulnerability.
Classification
Working Poc 95%
Target:
PHP 5.x (tested on 5.6.2)
No auth needed
Prerequisites:
Bash as the system shell · PHP with mail() function enabled · Environment variable manipulation allowed
exploitdb
WRITEUP
webappsmultiple
https://www.exploit-db.com/exploits/36609
This is a detailed technical analysis of multiple vulnerabilities in Kemp Load Master, including RCE via command injection in CGI scripts, CSRF, XSS, and DoS. The writeup provides root cause analysis, affected endpoints, and exploitation techniques.
Classification
Writeup 95%
Attack Type
Rce | Xss | Csrf | Dos
Target:
Kemp Load Master 7.1.16 and previous versions
Auth required
Prerequisites:
Authenticated access to the web administrative interface · Basic authentication credentials
exploitdb
WORKING POC
rubyremotelinux
https://www.exploit-db.com/exploits/34862
This Metasploit module exploits CVE-2014-6271 (Shellshock) by injecting malicious environment variables via Pure-FTPd's external authentication mechanism, achieving remote code execution. It leverages the bash vulnerability to execute arbitrary commands by manipulating the FTP login process.
Classification
Working Poc 100%
Target:
Pure-FTPd (with external authentication enabled)
No auth needed
Prerequisites:
Pure-FTPd configured to use external authentication · Bash vulnerable to Shellshock (CVE-2014-6271)
exploitdb
WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34896
This exploit leverages CVE-2014-6271 (Shellshock) to achieve remote code execution via SMTP headers. It sends a crafted email with malicious headers containing the payload to a vulnerable SMTP server, exploiting the bash environment variable injection flaw.
Classification
Working Poc 95%
Target:
GNU Bash versions 4.2.x < 4.2.48 (via SMTP servers like Postfix with procmail)
No auth needed
Prerequisites:
Vulnerable SMTP server with bash environment variable injection vulnerability · Network access to the target SMTP port (25)
exploitdb
WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34860
This exploit leverages the Shellshock vulnerability (CVE-2014-6271) in Bash by crafting malicious DHCP packets. It listens for DHCP DISCOVER broadcasts, extracts client details, and responds with an OFFER and ACK containing a malicious payload in the URL option (114), triggering remote code execution via the vulnerable Bash environment variable parsing.
Classification
Working Poc 95%
Target:
Bash (versions up to 4.3.11)
No auth needed
Prerequisites:
Network access to broadcast DHCP traffic · Vulnerable Bash version on target system
exploitdb
WRITEUP
remotelinux
https://www.exploit-db.com/exploits/34765
This is a technical writeup explaining the Bash Shellshock vulnerability (CVE-2014-6271), detailing how specially crafted environment variables can inject and execute arbitrary code. It includes examples of vulnerable and patched behavior, along with an explanation of the root cause.
Classification
Writeup 100%
Target:
Bash (versions before the patch)
No auth needed
Prerequisites:
Access to a system running a vulnerable version of Bash · Ability to set environment variables
exploitdb
WORKING POC
rubyremotelinux
https://www.exploit-db.com/exploits/35115
This Metasploit module exploits CVE-2014-6271 (Shellshock) by injecting malicious environment variables into CUPS filter configurations, achieving remote code execution. It supports both CVE-2014-6271 and CVE-2014-6278 payloads and includes authentication handling.
Classification
Working Poc 100%
Target:
CUPS (Common Unix Printing System) versions 1.4.3, 1.5.3, 1.6.2, 1.7.2
Auth required
Prerequisites:
CUPS server with vulnerable Bash version · Valid CUPS credentials · Network access to port 631
exploitdb
WORKING POC
phpremotelinux
https://www.exploit-db.com/exploits/34766
This PHP script exploits CVE-2014-6271 (Shellshock) by sending a crafted HTTP request with a malicious User-Agent header to a vulnerable CGI script, triggering remote code execution via Bash environment variable injection.
Classification
Working Poc 100%
Target:
GNU Bash (versions up to 3.2.51(1)-release)
No auth needed
Prerequisites:
Vulnerable Bash version · CGI script accessible via HTTP
exploitdb
WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34900
This is a functional exploit for CVE-2014-6271 (Shellshock) that leverages the vulnerability in Bash via HTTP headers to execute arbitrary commands. It supports both reverse and bind shell payloads, targeting vulnerable CGI scripts on Apache servers.
Classification
Working Poc 100%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable Bash version · Exposed CGI script on target server
exploitdb
WORKING POC
rubyremotehardware
https://www.exploit-db.com/exploits/36504
This Metasploit module exploits CVE-2014-6271 (ShellShock) to achieve remote code execution on QNAP Turbo NAS devices by injecting malicious environment variables via the User-Agent header in HTTP requests to a CGI script.
Classification
Working Poc 95%
Target:
QNAP Turbo NAS (all models except TS-100, TS-101, TS-200)
No auth needed
Prerequisites:
Network access to the target QNAP device · CGI script endpoint (default: /cgi-bin/index.cgi)
exploitdb
WORKING POC
rubyremotehardware
https://www.exploit-db.com/exploits/36503
This Metasploit module exploits CVE-2014-6271 (ShellShock) to spawn a remote admin shell on QNAP Turbo NAS devices by injecting malicious environment variables via HTTP User-Agent header, triggering a vulnerable Bash instance to execute arbitrary commands.
Classification
Working Poc 100%
Target:
QNAP Turbo NAS (all models except TS-100, TS-101, TS-200)
No auth needed
Prerequisites:
Network access to the target device · Vulnerable Bash version on the target
exploitdb
WORKING POC
pythonwebappscgi
https://www.exploit-db.com/exploits/34839
This Python script exploits CVE-2014-6271 (ShellShock) in IPFire <= 2.15 core 82 by injecting malicious environment variables into a CGI script via HTTP headers, allowing authenticated remote command execution.
Classification
Working Poc 100%
Target:
IPFire <= 2.15 core 82
Auth required
Prerequisites:
Authenticated access to the IPFire web interface · Target must be running a vulnerable version of Bash
exploitdb
WORKING POC
rubywebappscgi
https://www.exploit-db.com/exploits/34895
This Metasploit module exploits CVE-2014-6271 (Shellshock) by sending a maliciously crafted HTTP request to a vulnerable CGI script, injecting a bash command that writes and executes a payload. The exploit leverages the environment variable injection flaw in GNU Bash.
Classification
Working Poc 100%
Target:
GNU Bash (versions up to 4.3)
No auth needed
Prerequisites:
Vulnerable CGI script accessible via HTTP · Target system running a vulnerable version of Bash
exploitdb
WORKING POC
rubyremotecgi
https://www.exploit-db.com/exploits/34777
This Metasploit module exploits CVE-2014-6271 (Shellshock) by sending a crafted HTTP request with a malicious User-Agent header to a BASH-based CGI script, allowing arbitrary command execution. The exploit leverages the vulnerability in BASH's environment variable parsing to inject and execute commands.
Classification
Working Poc 100%
Target:
BASH (versions prior to 4.3)
No auth needed
Prerequisites:
A vulnerable BASH-based CGI script accessible via HTTP
metasploit
WORKING POC
by scriptjunkie · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/server/dhclient_bash_env.rb
This Metasploit module exploits the Shellshock vulnerability (CVE-2014-6271) by acting as a malicious DHCP server that injects crafted environment variables into dhclient requests, leading to remote code execution.
Classification
Working Poc 100%
Target:
dhclient (Bash via environment variables)
No auth needed
Prerequisites:
Network access to DHCP client · Vulnerable Bash version (pre-patch for CVE-2014-6271)
metasploit
WORKING POC
NORMAL
by Mario Ledo (Metasploit module), Gabriel Follon (Metasploit module), Kyle George (Vulnerability discovery) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/smtp/qmail_bash_env_exec.rb
This Metasploit module exploits the Shellshock vulnerability (CVE-2014-6271) in Qmail by injecting malicious environment variables via the SMTP MAIL FROM field, leading to remote command execution if /bin/sh is linked to Bash.
Classification
Working Poc 100%
Target:
Qmail (qmail-1.03, netqmail-1.06)
No auth needed
Prerequisites:
Vulnerable Bash version linked to /bin/sh · Valid recipient email address
metasploit
WORKING POC
EXCELLENT
by Stephane Chazelas, egypt · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/dhcp/bash_environment.rb
This Metasploit module exploits the Shellshock vulnerability (CVE-2014-6271) by injecting malicious environment variables via DHCP responses to achieve remote code execution. It writes the payload into /etc/crontab and cleans up after establishing a session.
Classification
Working Poc 100%
Target:
Bash (versions with Shellshock vulnerability), dhclient
No auth needed
Prerequisites:
Vulnerable Bash version · Target system using dhclient for DHCP · Network access to send malicious DHCP responses
metasploit
WORKING POC
EXCELLENT
by Stephane Chazelas, Frank Denis, Spencer McIntyre · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb
This Metasploit module exploits the Shellshock vulnerability (CVE-2014-6271) in Pure-FTPd when configured with external Bash authentication. It injects malicious environment variables to achieve remote code execution via a crafted FTP login.
Classification
Working Poc 100%
Target:
Pure-FTPd (with --with-extauth and Bash authentication)
No auth needed
Prerequisites:
Pure-FTPd compiled with --with-extauth · Bash vulnerable to Shellshock (CVE-2014-6271) · External Bash script used for authentication
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ipfire_bashbug_exec.rb
This Metasploit module exploits CVE-2014-6271 (Shellshock) in IPFire firewall systems by injecting a malicious environment variable via HTTP headers, leading to remote command execution. It includes authentication handling and version checking to confirm vulnerability.
Classification
Working Poc 100%
Target:
IPFire <= 2.15 Update Core 82
Auth required
Prerequisites:
Network access to the target · Valid credentials for IPFire web interface
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb
This Metasploit module exploits CVE-2014-6271 (Shellshock) by injecting malicious environment variables via the User-Agent header in a GET request to the 'ping.sh' CGI script on Advantech switches running Boa web server. It achieves remote command execution by leveraging the Bash vulnerability.
Classification
Working Poc 100%
Target:
Advantech Switches with Boa web server (firmware version 1322_D1.98)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Bash · Target must have the 'ping.sh' CGI script accessible via Boa web server
metasploit
WORKING POC
NORMAL
by Stephane Chazelas, juken, joev, mubix · rubypocosx
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/vmware_bash_function_root.rb
This Metasploit module exploits the Shellshock vulnerability (CVE-2014-6271) in Bash to achieve local privilege escalation on macOS by targeting VMWare Fusion's SUID binary `vmware-vmx-stats`. It uploads a payload to a writable directory and executes it via environment variable injection.
Classification
Working Poc 100%
Target:
VMWare Fusion on macOS 10.9 Mavericks
No auth needed
Prerequisites:
Vulnerable Bash version (Shellshock) · VMWare Fusion installed · Writable directory (e.g., /tmp)