- Apache, which uses CGI, through mod_cgi and mod_cgid, which are written in Bash or run Bash subshells.
- Some DHCP software.
- OpenSSH servers that use ForceCommand.
- Other network software that uses Bash.
Checking the system
On any system running Bash, you can run the following under bash:The part that says "Bash is vulnerable!" represents the part where the hacker could inject malicious code into the system. Therefore, if the result is:env VAR='() { :;}; echo Bash is vulnerable!' bash -c "echo Bash Test"
Your system is at risk! Therefore, if the result does not display this line, then the server is not vulnerable to the exploit.Bash is vulnerable! Bash Test
Remote website testing
You can run this test to check if there is a security breach through your website: Tool for testing ShellShock' Bash Vulnerability CVE-2014-6271Fixing the breach: Updating Bash
The quickest and easiest way is to update via your package manager (apt-get, yum). We will only review Debian, Ubuntu, Red-Hat, Centos, and Fedora. Debian/Ubuntu: apt-getCentOS/RedHat/Fedora: yumsudo apt-get update && sudo apt-get install --only-upgrade bash
It is important to remember to do this for all of your servers. Now you can check again to see if the vulnerability still exists. Good luck!sudo yum update bash