[Fix] Linux Bash Code Injection Vulnerability – ShellShock
ShellShock is new Linux vulnerability affecting all versions of Bash package. This vulnerability is worse than HeartBleed! This command line vulnerability is present in Mac OS X too. Basically it’s there in all the systems having Bash, a software used to control the command line in Unix.
To test if you are vulnerable to ShellShock, run this command:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test" |
If you see output:
vulnerable | |
this is a test |
that means you are vulnerable!
Fix for Redhat packages:
yum update bash |
Fix for Ubuntu/Debian packages:
apt-get upgrade bash |
After running above commands, check again to see if you are vulnerable:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test" |
If you see below output, that means you are no longer vulnerable
bash: warning: x: ignoring function definition attempt | |
bash: error importing function definition for `x' | |
this is a test |
Leave a comment
Welcome to my Blog
Certifications
Honor
Recognition
Contributions
Categories
- Apache (2)
- ChatGPT (1)
- Domain name (2)
- eCommerce (2)
- htaccess (1)
- Humor (3)
- Instagram API (1)
- jQuery (4)
- JSON (1)
- Linux (10)
- Magento (142)
- Magento admin (58)
- Magento Certification (5)
- Magento error (13)
- Magento frontend (68)
- Magento Imagine (2)
- Magento Interview (5)
- Magento Master (2)
- Magento2 (10)
- Mobile (1)
- MySQL (7)
- OpenAI (1)
- OroCRM (2)
- Performance (2)
- PHP (8)
- Prototype JS (3)
- Security (4)
- Wordpress (3)
- XML (2)
Tag Cloud
500 internal server error admin answers attribute bug category checkbox checkout cookie customer difference domain name EAV error event extension interview invoice jquery linux magento magento2 magento admin magento error magento interview questions magento orm mysql observer order pinterest product products questions redirect register remove script session simplexml to array state status study guide tax url wordpress