shellshock_test.sh 2.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182
  1. #!/bin/bash
  2. EXITCODE=0
  3. # CVE-2014-6271
  4. CVE20146271=$(env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test" 2>&1 | grep 'vulnerable' | wc -l)
  5. echo -n "CVE-2014-6271 (original shellshock): "
  6. if [ $CVE20146271 -gt 0 ]; then
  7. echo -e "\033[91mVULNERABLE\033[39m"
  8. EXITCODE=$((EXITCODE+1))
  9. else
  10. echo -e "\033[92mnot vulnerable\033[39m"
  11. fi
  12. # CVE-2014-6277
  13. # it is fully mitigated by the environment function prefix passing avoidance
  14. CVE20146277=$((shellshocker="() { x() { _;}; x() { _;} <<a; }" bash -c date 2>/dev/null || echo vulnerable) | grep 'vulnerable' | wc -l)
  15. echo -n "CVE-2014-6277 (segfault): "
  16. if [ $CVE20146277 -gt 0 ]; then
  17. echo -e "\033[91mVULNERABLE\033[39m"
  18. EXITCODE=$((EXITCODE+2))
  19. else
  20. echo -e "\033[92mnot vulnerable\033[39m"
  21. fi
  22. # CVE-2014-6278
  23. CVE20146278=$(shellshocker='() { echo vulnerable; }' bash -c shellshocker 2>/dev/null | grep 'vulnerable' | wc -l)
  24. echo -n "CVE-2014-6278 (Florian's patch): "
  25. if [ $CVE20146278 -gt 0 ]; then
  26. echo -e "\033[91mVULNERABLE\033[39m"
  27. EXITCODE=$((EXITCODE+4))
  28. else
  29. echo -e "\033[92mnot vulnerable\033[39m"
  30. fi
  31. # CVE-2014-7169
  32. CVE20147169=$((cd /tmp; rm -f /tmp/echo; env X='() { (a)=>\' bash -c "echo echo nonvuln" 2>/dev/null; [[ "$(cat echo 2> /dev/null)" == "nonvuln" ]] && echo "vulnerable" 2> /dev/null) | grep 'vulnerable' | wc -l)
  33. echo -n "CVE-2014-7169 (taviso bug): "
  34. if [ $CVE20147169 -gt 0 ]; then
  35. echo -e "\033[91mVULNERABLE\033[39m"
  36. EXITCODE=$((EXITCODE+8))
  37. else
  38. echo -e "\033[92mnot vulnerable\033[39m"
  39. fi
  40. # CVE-2014-7186
  41. CVE20147186=$((bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' 2>/dev/null || echo "vulnerable") | grep 'vulnerable' | wc -l)
  42. echo -n "CVE-2014-7186 (redir_stack bug): "
  43. if [ $CVE20147186 -gt 0 ]; then
  44. echo -e "\033[91mVULNERABLE\033[39m"
  45. EXITCODE=$((EXITCODE+16))
  46. else
  47. echo -e "\033[92mnot vulnerable\033[39m"
  48. fi
  49. # CVE-2014-7187
  50. CVE20147187=$(((for x in {1..200}; do echo "for x$x in ; do :"; done; for x in {1..200}; do echo done; done) | bash || echo "vulnerable") | grep 'vulnerable' | wc -l)
  51. echo -n "CVE-2014-7187 (nested loops off by one): "
  52. if [ $CVE20147187 -gt 0 ]; then
  53. echo -e "\033[91mVULNERABLE\033[39m"
  54. EXITCODE=$((EXITCODE+32))
  55. else
  56. echo -e "\033[92mnot vulnerable\033[39m"
  57. fi
  58. # CVE-2014-////
  59. CVE2014=$(env X=' () { }; echo vulnerable' bash -c 'date' | grep 'vulnerable' | wc -l)
  60. echo -n "CVE-2014-//// (exploit 3 on http://shellshocker.net/): "
  61. if [ $CVE2014 -gt 0 ]; then
  62. echo -e "\033[91mVULNERABLE\033[39m"
  63. EXITCODE=$((EXITCODE+64))
  64. else
  65. echo -e "\033[92mnot vulnerable\033[39m"
  66. fi
  67. exit $EXITCODE