Browse Source

Add new "shellshock" test

Tianon Gravi 10 years ago
parent
commit
72c8d11e4d

+ 1 - 0
test/config.sh

@@ -3,6 +3,7 @@ set -e
 
 globalTests=(
 	utc
+	shellshock
 )
 
 declare -A testAlias=(

+ 5 - 0
test/tests/shellshock/container.sh

@@ -0,0 +1,5 @@
+#!/bin/bash
+set -e
+
+# https://github.com/wreiske/shellshocker/blob/754798cd9a14903997faf3eacdfcf91044033719/shellshock_test.sh
+source shellshock_test.sh

+ 1 - 0
test/tests/shellshock/really-run.sh

@@ -0,0 +1 @@
+../run-bash-in-container.sh

+ 10 - 0
test/tests/shellshock/run.sh

@@ -0,0 +1,10 @@
+#!/bin/bash
+set -e
+
+if ! docker run --rm --entrypoint bash "$1" -c 'true' &> /dev/null; then
+	# die quietly and gracefully if this image doesn't have bash at all
+	exit 0
+fi
+
+dir="$(readlink -f "$(dirname "$BASH_SOURCE")")"
+source "$dir/really-run.sh" "$@"

+ 82 - 0
test/tests/shellshock/shellshock_test.sh

@@ -0,0 +1,82 @@
+#!/bin/bash
+EXITCODE=0
+
+# CVE-2014-6271
+CVE20146271=$(env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test" 2>&1 | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-6271 (original shellshock): "
+if [ $CVE20146271 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+1))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+# CVE-2014-6277
+# it is fully mitigated by the environment function prefix passing avoidance
+CVE20146277=$((shellshocker="() { x() { _;}; x() { _;} <<a; }" bash -c date 2>/dev/null || echo vulnerable) | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-6277 (segfault): "
+if [ $CVE20146277 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+2))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+# CVE-2014-6278
+CVE20146278=$(shellshocker='() { echo vulnerable; }' bash -c shellshocker 2>/dev/null | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-6278 (Florian's patch): "
+if [ $CVE20146278 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+4))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+# CVE-2014-7169
+CVE20147169=$((cd /tmp; rm -f /tmp/echo; env X='() { (a)=>\' bash -c "echo echo nonvuln" 2>/dev/null; [[ "$(cat echo 2> /dev/null)" == "nonvuln" ]] && echo "vulnerable" 2> /dev/null) | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-7169 (taviso bug): "
+if [ $CVE20147169 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+8))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+# CVE-2014-7186
+CVE20147186=$((bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' 2>/dev/null || echo "vulnerable") | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-7186 (redir_stack bug): "
+if [ $CVE20147186 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+16))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+# CVE-2014-7187
+CVE20147187=$(((for x in {1..200}; do echo "for x$x in ; do :"; done; for x in {1..200}; do echo done; done) | bash || echo "vulnerable") | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-7187 (nested loops off by one): "
+if [ $CVE20147187 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+32))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+# CVE-2014-////
+CVE2014=$(env X=' () { }; echo vulnerable' bash -c 'date' | grep 'vulnerable' | wc -l)
+
+echo -n "CVE-2014-//// (exploit 3 on http://shellshocker.net/): "
+if [ $CVE2014 -gt 0 ]; then
+	echo -e "\033[91mVULNERABLE\033[39m"
+	EXITCODE=$((EXITCODE+64))
+else
+	echo -e "\033[92mnot vulnerable\033[39m"
+fi
+
+exit $EXITCODE