CVE-2014-7169

CRITICAL KEV

GNU Bash <4.3 - Code Injection

Title source: llm

Description

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

Exploits (19)

nomisec SCANNER 5 stars
by chef-boneyard · poc
https://github.com/chef-boneyard/bash-shellshock
nomisec STUB 1 stars
by Gobinath-B · local
https://github.com/Gobinath-B/SHELL-SCHOCK
nomisec SCANNER
by gina-alaska · remote
https://github.com/gina-alaska/bash-cve-2014-7169-cookbook
exploitdb WORKING POC
phpremotelinux
https://www.exploit-db.com/exploits/34766
exploitdb WORKING POC
rubyremotehardware
https://www.exploit-db.com/exploits/36503
exploitdb WORKING POC
rubyremotehardware
https://www.exploit-db.com/exploits/36504
exploitdb WORKING POC
rubyremotecgi
https://www.exploit-db.com/exploits/34777
exploitdb WORKING POC
rubywebappscgi
https://www.exploit-db.com/exploits/34895
exploitdb WORKING POC
webappsphp
https://www.exploit-db.com/exploits/35146
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34896
exploitdb WORKING POC
rubyremotelinux
https://www.exploit-db.com/exploits/35115
exploitdb WORKING POC
rubyremotelinux
https://www.exploit-db.com/exploits/34862
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/36933
exploitdb WRITEUP
remotelinux
https://www.exploit-db.com/exploits/34765
exploitdb WORKING POC
pythonremotelinux
https://www.exploit-db.com/exploits/34860
exploitdb WORKING POC
by hobbily plunt · textremotelinux
https://www.exploit-db.com/exploits/34879
exploitdb WRITEUP
webappsmultiple
https://www.exploit-db.com/exploits/36609
vulncheck_xdb SCANNER
remote
https://github.com/ajansha/shellshock
exploitdb WORKING POC
pythonwebappscgi
https://www.exploit-db.com/exploits/34839

References (161)

... and 141 more

Scores

CVSS v3 9.8
EPSS 0.9011
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-01-28
VulnCheck KEV 2014-09-30
InTheWild.io 2022-01-28
ENISA EUVD EUVD-2014-7046

Classification

CWE
CWE-78
Status draft

Affected Products (50)

gnu/bash < 4.3
arista/eos < 4.9.12
oracle/linux
oracle/linux
oracle/linux
qnap/qts < 4.1.1
qnap/qts
qnap/qts
mageia/mageia
mageia/mageia
redhat/gluster_storage_server_for_on-premise
redhat/virtualization
redhat/enterprise_linux
redhat/enterprise_linux
redhat/enterprise_linux
... and 35 more

Timeline

Published Sep 25, 2014
KEV Added Jan 28, 2022
Tracked Since Feb 18, 2026