exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/35115
This Metasploit module exploits CVE-2014-6271 and CVE-2014-6278 (Shellshock) by injecting malicious environment variables into CUPS filter configurations, leading to remote code execution. It adds a printer with a crafted PPD file and triggers payload execution via a test print job.
Classification
Working Poc 100%
Target:
CUPS (Common Unix Printing System) versions 1.4.3, 1.5.3, 1.6.2, 1.7.2
Auth required
Prerequisites:
Network access to CUPS web interface (port 631) · Valid CUPS credentials · Bash version vulnerable to Shellshock
exploitdb
WORKING POC
VERIFIED
by Phil Blank · pythonremotelinux
https://www.exploit-db.com/exploits/34896
This exploit leverages the Shellshock vulnerability (CVE-2014-6271) in Bash to execute arbitrary commands via SMTP headers. It sends a crafted email with malicious headers to a vulnerable SMTP server, triggering command execution.
Classification
Working Poc 95%
Target:
Bash versions 4.2.x < 4.2.48 (via SMTP servers like Postfix with procmail)
No auth needed
Prerequisites:
Vulnerable Bash version · SMTP server accepting external connections
exploitdb
WORKING POC
VERIFIED
by Fady Mohammed Osman · rubywebappscgi
https://www.exploit-db.com/exploits/34895
This Metasploit module exploits the Shellshock vulnerability (CVE-2014-6271) in Apache CGI scripts by sending a crafted HTTP request with a malicious User-Agent header. It delivers a payload to the target system, executes it, and cleans up afterward.
Classification
Working Poc 100%
Target:
Apache HTTP Server with CGI scripts (Bash-based)
No auth needed
Prerequisites:
Target must have a vulnerable version of Bash (CVE-2014-6271) · CGI script must be accessible and executable
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/34862
This Metasploit module exploits CVE-2014-6271 (Shellshock) in Pure-FTPd when configured to use external authentication. It injects malicious environment variables via FTP commands to achieve remote code execution.
Classification
Working Poc 100%
Target:
Pure-FTPd (with external authentication)
No auth needed
Prerequisites:
Pure-FTPd configured with external authentication · Bash vulnerable to Shellshock (CVE-2014-6271)
exploitdb
WORKING POC
VERIFIED
by Claudio Viviani · pythonwebappscgi
https://www.exploit-db.com/exploits/34839
This exploit leverages ShellShock (CVE-2014-6271) to perform authenticated remote command injection on IPFire <= 2.15 core 82 via manipulated HTTP headers. It uses Basic Auth to authenticate and injects a payload into the 'VULN' header to execute arbitrary commands.
Classification
Working Poc 95%
Target:
IPFire <= 2.15 core 82
Auth required
Prerequisites:
valid credentials for the IPFire web interface · access to the target's web interface
exploitdb
WRITEUP
VERIFIED
by Stephane Chazelas · textremotelinux
https://www.exploit-db.com/exploits/34765
This is a writeup explaining the CVE-2014-7910 vulnerability in Bash, which allows code injection via specially crafted environment variables. It demonstrates the flaw and the expected behavior after patching.
Classification
Writeup 100%
Target:
Bash (versions before the patch)
No auth needed
Prerequisites:
Access to a system with vulnerable Bash version · Ability to set environment variables
exploitdb
WORKING POC
VERIFIED
by Prakhar Prasad & Subho Halder · phpremotelinux
https://www.exploit-db.com/exploits/34766
This exploit leverages CVE-2014-6271 (Shellshock) to inject arbitrary commands via maliciously crafted HTTP headers targeting vulnerable Bash versions. It sends a GET request with a User-Agent header containing a payload that triggers the vulnerability in CGI scripts.
Classification
Working Poc 95%
Target:
GNU Bash versions up to 3.2.51(1)-release
No auth needed
Prerequisites:
Vulnerable Bash version · CGI script accessible via HTTP
exploitdb
WORKING POC
VERIFIED
by Shaun Colley · rubyremotecgi
https://www.exploit-db.com/exploits/34777
This Metasploit auxiliary module exploits CVE-2014-6271 (Shellshock) by sending a maliciously crafted HTTP User-Agent header to a BASH-based CGI script, allowing arbitrary command execution. The payload is injected via the 'CMD' parameter, and the exploit checks for a 200 response to confirm potential success.
Classification
Working Poc 95%
Target:
BASH-based CGI scripts (Shellshock vulnerability)
No auth needed
Prerequisites:
Target must have a BASH-based CGI script accessible via HTTP · Target must be vulnerable to CVE-2014-6271
exploitdb
WRITEUP
by Roberto Suggi Liverani · textwebappsmultiple
https://www.exploit-db.com/exploits/36609
This writeup details multiple vulnerabilities in Kemp Load Master, including RCE via command injection in the `fwaccess` endpoint, CSRF, XSS, and DoS. The RCE exploit leverages an `eval` statement in a bash script, allowing arbitrary command execution through crafted HTTP requests.
Classification
Writeup 90%
Attack Type
Rce | Xss | Csrf | Dos
Target:
Kemp Load Master 7.1-16 and previous versions
Auth required
Prerequisites:
Authenticated session or CSRF to bypass authentication · Network access to the administrative interface
exploitdb
WORKING POC
by Patrick Pellegrino · rubyremotehardware
https://www.exploit-db.com/exploits/36504
This Metasploit module exploits CVE-2014-6271 (ShellShock) in QNAP Turbo NAS devices by injecting malicious environment variables via the User-Agent header to achieve remote code execution. It sends a crafted HTTP request to trigger the vulnerability and execute arbitrary commands.
Classification
Working Poc 95%
Target:
QNAP Turbo NAS (all models except TS-100, TS-101, TS-200)
No auth needed
Prerequisites:
Network access to the target QNAP device · Vulnerable CGI script endpoint
exploitdb
WORKING POC
by Patrick Pellegrino · rubyremotehardware
https://www.exploit-db.com/exploits/36503
This Metasploit module exploits CVE-2014-6271 (ShellShock) to spawn a remote admin shell on QNAP Turbo NAS devices by injecting a malicious Bash environment variable via an HTTP request, which triggers the utelnetd service on a specified port.
Classification
Working Poc 95%
Target:
QNAP Turbo NAS (all models except TS-100, TS-101, TS-200)
No auth needed
Prerequisites:
Network access to the target device · Vulnerable CGI script accessible at /cgi-bin/index.cgi
exploitdb
WORKING POC
by Ryan King (Starfall) · textwebappsphp
https://www.exploit-db.com/exploits/35146
This exploit leverages the Shellshock vulnerability (CVE-2014-6271) in Bash to bypass PHP's disable_functions directive and execute arbitrary commands. It uses the mail() function with a crafted environment variable to trigger the vulnerability.
Classification
Working Poc 95%
Target:
PHP 5.x (tested on 5.6.2) with Bash as /bin/sh
No auth needed
Prerequisites:
Bash as the system shell (/bin/sh) · PHP with mail() function enabled · Environment variable manipulation allowed
exploitdb
WORKING POC
by hobbily plunt · textremotelinux
https://www.exploit-db.com/exploits/34879
This exploit leverages the ShellShock vulnerability (CVE-2014-6271) in OpenVPN's authentication script to execute arbitrary commands via environment variables, resulting in a reverse shell. The PoC demonstrates how a malicious client can exploit the vulnerability by injecting a payload into the username and password fields during authentication.
Classification
Working Poc 100%
Target:
OpenVPN 2.2.29
No auth needed
Prerequisites:
OpenVPN server with vulnerable version · Server configured to use external authentication script · Network access to the OpenVPN server
exploitdb
WORKING POC
by @0x00string · pythonremotelinux
https://www.exploit-db.com/exploits/34860
This exploit leverages the Shellshock vulnerability (CVE-2014-7910) in Bash to execute arbitrary commands via DHCP packets. It listens for DHCP DISCOVER broadcasts, crafts malicious OFFER and ACK packets with a reverse shell payload, and sends them to the target.
Classification
Working Poc 95%
Target:
Bash (versions affected by Shellshock, e.g., 4.3.11)
No auth needed
Prerequisites:
Network access to broadcast DHCP traffic · Target system running a vulnerable version of Bash · Target system configured to process DHCP option 114