ShellShock
Last updated
Last updated
Bash can also be used to run commands passed to it by applications and it is this feature that the vulnerability affects. One type of command that can be sent to Bash allows environment variables to be set. Environment variables are dynamic, named values that affect the way processes are run on a computer. The vulnerability lies in the fact that an attacker can tack-on malicious code to the environment variable, which will run once the variable is received.
Exploiting this vulnerability the page could throw an error.
You could find this vulnerability noticing that it is using an old Apache version and cgi_mod (with cgi folder) or using nikto
check for any cgi file on server ,
If you found any directory of /cgi-bin/ use extension like sh and cgi and bruteforce the directory
If you found any .sh or .cgi file , you can use shellshock reverse shell to connect back to us
We can put payload into useragent to execute it -