CVE-2014-7169

CRITICAL KEV

GNU Bash <4.3 - Code Injection

Title source: llm

Description

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

Exploits (19)

exploitdb WORKING POC
by hobbily plunt · textremotelinux
https://www.exploit-db.com/exploits/34879
nomisec SCANNER 5 stars
by chef-boneyard · poc
https://github.com/chef-boneyard/bash-shellshock
nomisec STUB 1 stars
by Gobinath-B · local
https://github.com/Gobinath-B/SHELL-SCHOCK
nomisec SCANNER
by gina-alaska · remote
https://github.com/gina-alaska/bash-cve-2014-7169-cookbook
vulncheck_xdb SCANNER
remote
https://github.com/ajansha/shellshock
exploitdb WORKING POC
webappsphp
https://www.exploit-db.com/exploits/35146
exploitdb WRITEUP
webappsmultiple
https://www.exploit-db.com/exploits/36609
exploitdb WORKING POC
rubyremotelinux
https://www.exploit-db.com/exploits/34862
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34896
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34860
exploitdb WRITEUP
remotelinux
https://www.exploit-db.com/exploits/34765
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/36933
exploitdb WORKING POC
rubyremotelinux
https://www.exploit-db.com/exploits/35115
exploitdb WORKING POC
phpremotelinux
https://www.exploit-db.com/exploits/34766
exploitdb WORKING POC
rubyremotehardware
https://www.exploit-db.com/exploits/36504
exploitdb WORKING POC
rubyremotehardware
https://www.exploit-db.com/exploits/36503
exploitdb WORKING POC
pythonwebappscgi
https://www.exploit-db.com/exploits/34839
exploitdb WORKING POC
rubywebappscgi
https://www.exploit-db.com/exploits/34895
exploitdb WORKING POC
rubyremotecgi
https://www.exploit-db.com/exploits/34777

References (161)

... and 141 more

Scores

CVSS v3 9.8
EPSS 0.9011
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-01-28
VulnCheck KEV 2014-09-30
InTheWild.io 2022-01-28
ENISA EUVD EUVD-2014-7046
CWE
CWE-78
Status published
Products (49)
apple/mac_os_x 10.0.0 - 10.10.0
arista/eos 4.9.0 - 4.9.12
canonical/ubuntu_linux 10.04
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
checkpoint/security_gateway < r77.30
citrix/netscaler_sdx_firmware < 9.3.67.5r1
debian/debian_linux 7.0
f5/arx_firmware 6.0.0 - 6.4.0
f5/big-ip_access_policy_manager 11.6.0
... and 39 more
Published Sep 25, 2014
KEV Added Jan 28, 2022
Tracked Since Feb 18, 2026