SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Shellshock Detection, Prevention, Timeline, and Lessons Learned
Date    Saturday October 11 2014, @01:15PM
Author    martyb
Topic   
from the he-who-does-not-learn-from-history dept.
https://soylentnews.org/article.pl?sid=14/10/11/0346234

First-time submitter barnsbarns writes:

David Wheeler has a nice write-up of the many aspects of the shellshock vulnerability in Bash, including a timeline of events and commentary on how to prevent vulnerabilities like shellshock in the future.

He even provides a quick test to see if your shell is still susceptible to shellshock:

To determine if a system is vulnerable to shellshock, run the following refined test on a Unix-like system command line (this should work on any Bourne or C shell):

env foo='() { echo not patched; }' bash -c foo

This will reply “bash: foo: command not found” on a repaired system, while a vulnerable system will typically reply “not patched” instead. The initial “env” can be omitted when typing the command into a POSIX/Bourne shell (including bash, dash, and ash).

The write-up shows that several mis-identifications of the problem were communicated, as well as how multiple solutions were constructed—thanks to the code being open-source.

He also presents a similar type of defect under Microsoft Windows where, in a CMD.EXE window, issuing these commands:

  set foo=bar^&ping -n 1 localhost
  echo %foo% 

will not only display the value of the "foo" environment variable, it will also cause a ping command to be executed.

[Update: fixed formatting of code sample.]

Links

  1. "barnsbarns" - https://soylentnews.org/~barnsbarns/
  2. "write-up" - http://www.dwheeler.com/essays/shellshock.html

© Copyright 2023 - SoylentNews, All Rights Reserved

printed from SoylentNews, Shellshock Detection, Prevention, Timeline, and Lessons Learned on 2023-06-05 02:10:05