{"id":1010,"date":"2014-09-27T18:27:10","date_gmt":"2014-09-27T18:27:10","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1010"},"modified":"2022-12-02T16:48:25","modified_gmt":"2022-12-02T11:18:25","slug":"shell-shock-the-bash-vulnerability","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/","title":{"rendered":"Shell Shock &#8211; The Bash Vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2014\/09\/bash-1024x681.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"bash - Varutra Consulting\"><\/p>\n<h3><strong>BASH (Baurne Again Shell)<\/strong><\/h3>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1011\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/imageblog.jpg\" alt=\"Shell Shock - The Bash Vulnerability\" width=\"286\" height=\"191\" \/><\/strong><\/p>\n<p style=\"text-align: justify\">Bash is the shell, or command language interpreter, that will appear in the GNU operating system. Bash is an sh-compatible shell that incorporates useful features from the Korn shell (ksh) and C shell (csh). It is intended to conform to the IEEE POSIX P1003.2\/ISO 9945.2 Shell and Tools standard. It offers functional improvements over sh for both programming and interactive use. In addition, most sh scripts can be run by Bash without modification. Bash is quite portable. It uses a configuration system that discovers characteristics of the compilation platform at build time, and may therefore be built on nearly every version of UNIX. Ports to UNIX-like systems such as QNX and Minix and to non-UNIX systems such as OS\/2, Windows 95\/98, and Windows NT are\u00a0available.<\/p>\n<p style=\"text-align: left\">Here is a short list of feature available in bash:<\/p>\n<ul>\n<li>History and Command Re-entry<\/li>\n<li>Job Control<\/li>\n<li>Shell Functions and Aliases<\/li>\n<li>Arrays<\/li>\n<li>Arithmetic<\/li>\n<li>Brace Expansion<\/li>\n<li>Substring Capabilities<\/li>\n<li>Expanded I\/O Capabilities<\/li>\n<li>Command Timing<\/li>\n<li>Editing and Completion etc..<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Shell Shock:<\/strong><\/h3>\n<p style=\"text-align: justify\">The Bash vulnerability, now dubbed by some as &#8220;Shellshock,&#8221; has been reportedly found in use by an active exploit against Web servers. A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. \u201cThis issue is especially dangerous as there are many possible ways Bash can be called by an application,\u201d<\/p>\n<p style=\"text-align: justify\"><a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6271\" target=\"_blank\" rel=\"noopener noreferrer\">The bug<\/a>, discovered by\u00a0<a href=\"http:\/\/stephane.chazelas.free.fr\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stephane Schazelas<\/a>, is related to how Bash processes environmental variables passed by the operating system or by a program calling a Bash-based script. If Bash has been configured as the default system shell, it can be used by network\u2013based attackers against servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts.<\/p>\n<p style=\"text-align: justify\">Because of its wide distribution, the vulnerability could be as wide-ranging as the Heartbleed bug, though it may not be nearly as dangerous. The vulnerability affects versions 1.14 through 4.3 of GNU Bash. Examples of exploitable systems include the following:<\/p>\n<ul>\n<li>Apache HTTP Servers that use CGI scripts (via\u00a0mod_cgi\u00a0and\u00a0mod_cgid) that are written in Bash or launch to Bash subshells<\/li>\n<li>Certain DHCP clients<\/li>\n<li>OpenSSH servers that use the\u00a0ForceCommandcapability<\/li>\n<li>Various network-exposed services that use Bash<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>How to check a vulnerable application for shell shock: <\/strong><\/h3>\n<p>There is an easy test to determine if a Linux or Unix system is vulnerable. To check your system, from a command line, type:<\/p>\n<p style=\"text-align: left\"><strong><em>env x='() { :;}; echo vulnerable&#8217; bash -c &#8220;echo this is a test&#8221;<\/em><\/strong><\/p>\n<p style=\"text-align: left\">If the system is vulnerable, the output will be:<\/p>\n<p style=\"text-align: left\"><strong><em>\u00a0 vulnerable<\/em><\/strong><\/p>\n<p style=\"text-align: left\"><strong><em>\u00a0 this is a test<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Fixing Vulnerability:<\/strong><\/h3>\n<p>The easiest way to fix the vulnerability is to use your default package manager to update the version of Bash. The following subsections cover updating Bash on various Linux distributions, including Ubuntu, Debian, CentOS, Red Hat, and Fedora.<\/p>\n<p><strong>APT-GET: Ubuntu \/ Debian<\/strong><\/p>\n<p>Update Bash to the latest version available via apt-get:<\/p>\n<p><strong>\u00a0sudo apt-get update &amp;&amp; sudo apt-get install &#8211;only-upgrade bash<\/strong><\/p>\n<p><strong>YUM: CentOS \/ Red Hat \/ Fedora<\/strong><\/p>\n<p>Update Bash to the latest version available via the\u00a0yum:<\/p>\n<p><strong>sudo yum update bash<\/strong><\/p>\n<p><strong>Note:<\/strong> Now check your system vulnerability again by running the command<\/p>\n<p>For more information refer: \u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2014-6271<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>An unaffected (or patched) system will output:<\/strong><\/h3>\n<p style=\"text-align: left\"><em>\u00a0bash: warning: x: ignoring function definition attempt<\/em><\/p>\n<p style=\"text-align: left\"><em>\u00a0bash: error importing function definition for `x&#8217;<\/em><\/p>\n<p style=\"text-align: left\"><em>\u00a0this is a test<\/em><\/p>\n<p>The fix is an update to a patched version of the Bash shell. To be safe, administrators should do a blanket update of their versions of Bash in any case.<\/p>\n<p>References:<\/p>\n<p><a href=\"http:\/\/www.zdnet.com\/shellshock-how-to-protect-your-unix-linux-and-mac-servers-7000034072\/\">http:\/\/www.zdnet.com\/shellshock-how-to-protect-your-unix-linux-and-mac-servers-7000034072\/<\/a><\/p>\n<p><a href=\"http:\/\/www.cnet.com\/news\/vast-majority-of-os-x-users-safe-from-bash-shellshock-bug-apple-says\/\">http:\/\/www.cnet.com\/news\/vast-majority-of-os-x-users-safe-from-bash-shellshock-bug-apple-says\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Written By,<\/p>\n<p><em>Attack &amp; PenTest Team,<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>BASH (Baurne Again Shell) Bash is the shell, or command language interpreter, that will appear in the GNU operating system. Bash is an sh-compatible shell&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,57],"tags":[93,94,95,96],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"The Bash vulnerability, now dubbed by some as &quot;Shell shock,&quot; has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Shell Shock - The Bash Vulnerability to Exploit Web Servers\" \/>\n\t\t<meta property=\"og:description\" content=\"The Bash vulnerability, now dubbed by some as &quot;Shell shock,&quot; has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1127\" \/>\n\t\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:tag\" content=\"bash vulnerability\" \/>\n\t\t<meta property=\"article:tag\" content=\"bashbug\" \/>\n\t\t<meta property=\"article:tag\" content=\"shellshock\" \/>\n\t\t<meta property=\"article:tag\" content=\"stephane schazelas\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2014-09-27T18:27:10+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T11:18:25+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Shell Shock - The Bash Vulnerability to Exploit Web Servers\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The Bash vulnerability, now dubbed by some as &quot;Shell shock,&quot; has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#article\",\"name\":\"Shell Shock - The Bash Vulnerability to Exploit Web Servers\",\"headline\":\"Shell Shock &#8211; The Bash Vulnerability\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2014\\\/09\\\/bash.png\",\"width\":1127,\"height\":750,\"caption\":\"bash\"},\"datePublished\":\"2014-09-27T18:27:10+05:30\",\"dateModified\":\"2022-12-02T16:48:25+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":5,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#webpage\"},\"articleSection\":\"Case Study, Vulnerability Disclosure, bash vulnerability, bashbug, shellshock, stephane schazelas\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#listItem\",\"position\":2,\"name\":\"Shell Shock - The Bash Vulnerability\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/\",\"name\":\"Shell Shock - The Bash Vulnerability to Exploit Web Servers\",\"description\":\"The Bash vulnerability, now dubbed by some as \\\"Shell shock,\\\" has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2014\\\/09\\\/bash.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#mainImage\",\"width\":1127,\"height\":750,\"caption\":\"bash\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/shell-shock-the-bash-vulnerability\\\/#mainImage\"},\"datePublished\":\"2014-09-27T18:27:10+05:30\",\"dateModified\":\"2022-12-02T16:48:25+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Shell Shock - The Bash Vulnerability to Exploit Web Servers<\/title>\n\n","aioseo_head_json":{"title":"Shell Shock - The Bash Vulnerability to Exploit Web Servers","description":"The Bash vulnerability, now dubbed by some as \"Shell shock,\" has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Shell Shock - The Bash Vulnerability to Exploit Web Servers","og:description":"The Bash vulnerability, now dubbed by some as &quot;Shell shock,&quot; has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png","og:image:width":"1127","og:image:height":"750","article:section":"Case Study","article:tag":["bash vulnerability","bashbug","shellshock","stephane schazelas"],"article:published_time":"2014-09-27T18:27:10+00:00","article:modified_time":"2022-12-02T11:18:25+00:00","twitter:card":"summary_large_image","twitter:title":"Shell Shock - The Bash Vulnerability to Exploit Web Servers","twitter:description":"The Bash vulnerability, now dubbed by some as &quot;Shell shock,&quot; has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#article","name":"Shell Shock - The Bash Vulnerability to Exploit Web Servers","headline":"Shell Shock &#8211; The Bash Vulnerability","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/09\/bash.png","width":1127,"height":750,"caption":"bash"},"datePublished":"2014-09-27T18:27:10+05:30","dateModified":"2022-12-02T16:48:25+05:30","inLanguage":"en-US","commentCount":5,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#webpage"},"articleSection":"Case Study, Vulnerability Disclosure, bash vulnerability, bashbug, shellshock, stephane schazelas"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#listItem","position":2,"name":"Shell Shock - The Bash Vulnerability","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/","name":"Shell Shock - The Bash Vulnerability to Exploit Web Servers","description":"The Bash vulnerability, now dubbed by some as \"Shell shock,\" has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/09\/bash.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#mainImage","width":1127,"height":750,"caption":"bash"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/#mainImage"},"datePublished":"2014-09-27T18:27:10+05:30","dateModified":"2022-12-02T16:48:25+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"1010","title":"Shell Shock - The Bash Vulnerability to Exploit Web Servers","description":"The Bash vulnerability, now dubbed by some as \"Shell shock,\" has been reportedly found in use by an active exploit against Web servers and Linux and Unix OS.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Shell Shock \",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\" Bash vulnerability\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/09\/bash.png","og_image_width":"1127","og_image_height":"750","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:18:04","updated":"2022-12-02 11:30:59"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tShell Shock \u2013 The Bash Vulnerability\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"Shell Shock &#8211; The Bash Vulnerability","link":"https:\/\/www.varutra.com\/varutravrt3\/shell-shock-the-bash-vulnerability\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1010"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=1010"}],"version-history":[{"count":6,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1010\/revisions"}],"predecessor-version":[{"id":20373,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1010\/revisions\/20373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3254"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=1010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=1010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=1010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}