Script http-shellshock
Script types:
portrule
Categories:
exploit, vuln, intrusive
Download: https://svn.nmap.org/nmap/scripts/http-shellshock.nse
Script Summary
Attempts to exploit the "shellshock" vulnerability (CVE-2014-6271 and CVE-2014-7169) in web applications.
To detect this vulnerability the script executes a command that prints a random string and then attempts to find it inside the response body. Web apps that don't print back information won't be detected with this method.
By default the script injects the payload in the HTTP headers User-Agent, Cookie, and Referer.
Vulnerability originally discovered by Stephane Chazelas.
References:
- http://www.openwall.com/lists/oss-security/2014/09/24/10
- http://seclists.org/oss-sec/2014/q3/685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
Script Arguments
- http-shellshock.uri
URI. Default: /
- http-shellshock.header
HTTP header to use in requests. Default: User-Agent
- http-shellshock.cmd
Custom command to send inside payload. Default: nil
- slaxml.debug
See the documentation for the slaxml library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
See the documentation for the http library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
- vulns.short, vulns.showall
See the documentation for the vulns library.
Example Usage
nmap -sV -p- --script http-shellshock <target> nmap -sV -p- --script http-shellshock --script-args uri=/cgi-bin/bin,cmd=ls <target>
Script Output
PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-shellshock: | VULNERABLE: | HTTP Shellshock vulnerability | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2014-6271 | This web application might be affected by the vulnerability known as Shellshock. It seems the server | is executing commands injected via malicious HTTP headers. | | Disclosure date: 2014-09-24 | References: | http://www.openwall.com/lists/oss-security/2014/09/24/10 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 | http://seclists.org/oss-sec/2014/q3/685 |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
Requires
Authors:
License: Same as Nmap--See https://nmap.org/book/man-legal.html