GNU Bash Environment Variable Handling Code Injection via ProFTPD (Shellshock)

Critical Nessus Plugin ID 77986


The remote FTP server is affected by a remote code execution vulnerability.


The remote FTP server is affected by a remote code execution vulnerability due to an error in the Bash shell running on the remote host. A remote, unauthenticated attacker can execute arbitrary code on the remote host by sending a specially crafted request via the USER FTP command. The 'mod_exec' module exports the attacker-supplied username as an environment variable, which is then evaluated by Bash as code.


Apply the referenced patch.

See Also

Plugin Details

Severity: Critical

ID: 77986

File Name: proftpd_bash_injection.nasl

Version: $Revision: 1.13 $

Type: remote

Family: FTP

Published: 2014/09/30

Modified: 2017/06/19

Dependencies: 10092, 42149

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 8.8

Temporal Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:gnu:bash, cpe:/a:proftpd:proftpd

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2014/09/24

Vulnerability Publication Date: 2014/09/24

Exploitable With

Core Impact

Metasploit (Apache mod_cgi Bash Environment Variable Code Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169

BID: 70103, 70137

OSVDB: 112004

CERT: 252743

IAVA: 2014-A-0142

EDB-ID: 34765, 34766, 34777