GNU Bash Environment Variable Handling Code Injection via ProFTPD (Shellshock)

Critical Nessus Plugin ID 77986

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.7

Synopsis

The remote FTP server is affected by a remote code execution vulnerability.

Description

The remote FTP server is affected by a remote code execution vulnerability due to an error in the Bash shell running on the remote host. A remote, unauthenticated attacker can execute arbitrary code on the remote host by sending a specially crafted request via the USER FTP command. The 'mod_exec' module exports the attacker-supplied username as an environment variable, which is then evaluated by Bash as code.

Solution

Apply the referenced patch.

See Also

http://www.proftpd.org/docs/contrib/mod_exec.html#ExecEnviron

http://seclists.org/oss-sec/2014/q3/650

http://www.nessus.org/u?dacf7829

https://www.invisiblethreat.ca/post/shellshock/

Plugin Details

Severity: Critical

ID: 77986

File Name: proftpd_bash_injection.nasl

Version: 1.21

Type: remote

Family: FTP

Published: 2014/09/30

Updated: 2020/06/12

Dependencies: 10092, 42149

Risk Information

Risk Factor: Critical

VPR Score: 9.7

CVSS Score Source: CVE-2014-7169

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:gnu:bash, cpe:/a:proftpd:proftpd

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2014/09/24

Vulnerability Publication Date: 2014/09/24

Exploitable With

Core Impact

Metasploit (Apache mod_cgi Bash Environment Variable Code Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271, CVE-2014-7169

BID: 70103, 70137

CERT: 252743

IAVA: 2014-A-0142

EDB-ID: 34765, 34766, 34777