CVE-2014-6278

HIGH KEV

GNU Bash <4.3 - RCE

Title source: llm

Description

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

Exploits (10)

exploitdb WORKING POC VERIFIED
by Federico Galatolo · pythonremotelinux
https://www.exploit-db.com/exploits/34900
exploitdb WORKING POC
by lastc0de · textwebappscgi
https://www.exploit-db.com/exploits/39887
exploitdb WORKING POC
by thatchriseckert · pythonremotehardware
https://www.exploit-db.com/exploits/39568
vulncheck_xdb WRITEUP
remote
https://github.com/veeeveeeveee/tabijibiyori-wgetCloud-al5tVPOHMdTt9x2d
vulncheck_xdb WORKING POC
remote
https://github.com/threat9/routersploit
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34860
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/36933
metasploit WORKING POC
by Stephane Chazelas, wvu, lcamtuf · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
metasploit WORKING POC EXCELLENT
by Stephane Chazelas, wvu, juan vazquez, s module to get native sessions · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_mod_cgi_bash_env_exec.rb
metasploit WORKING POC EXCELLENT
by Stephane Chazelas, lcamtuf, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/cups_bash_env_exec.rb

References (111)

... and 91 more

Scores

CVSS v3 8.8
EPSS 0.9140
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2025-10-02
VulnCheck KEV 2018-03-01
ENISA EUVD EUVD-2014-6163
CWE
CWE-78
Status published
Products (25)
gnu/bash 1.14.0
gnu/bash 1.14.1
gnu/bash 1.14.2
gnu/bash 1.14.3
gnu/bash 1.14.4
gnu/bash 1.14.5
gnu/bash 1.14.6
gnu/bash 1.14.7
gnu/bash 2.0
gnu/bash 2.01
... and 15 more
Published Sep 30, 2014
KEV Added Oct 02, 2025
Tracked Since Feb 18, 2026