What is the most common method to exploit the “Bash Bug” or “Shellshock” vulnerability?
A.
SYN Flood
B.
SSH
C.
Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
D.
Manipulate format strings in text fields
The Answer Is:
C
This question includes an explanation.
Explanation:
In CEH v13 Module 06: Malware Threats, the Shellshock vulnerability (CVE-2014-6271) is described as a severe bug in the Bash shell where specially crafted environment variables could be used to execute arbitrary commands.
The most common attack vector: Web servers using CGI scripts written in Bash.
Attackers send malicious HTTP requests to CGI endpoints where Bash executes commands.