SIP Script Remote Command Execution via Shellshock

Critical Nessus Plugin ID 78822


The remote SIP server uses scripts that allow remote command execution via Shellshock.


The remote host appears to be running SIP. SIP itself is not vulnerable to Shellshock; however, any Bash script that SIP runs for filtering or other routing tasks could potentially be affected if the script exports an environmental variable from the content or headers of a SIP message.

A negative result from this plugin does not prove conclusively that the remote system is not affected by Shellshock, only that any scripts the SIP proxy may be running do not create the conditions that are exploitable via the Shellshock flaw.


Apply the referenced Bash patch or remove the affected SIP scripts / modules.

See Also

Plugin Details

Severity: Critical

ID: 78822

File Name: shellshock_sip_invite.nasl

Version: $Revision: 1.8 $

Type: remote

Family: General

Published: 2014/11/03

Modified: 2017/04/25

Dependencies: 21642

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:gnu:bash

Required KB Items: Settings/ThoroughTests

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2014/09/26

Vulnerability Publication Date: 2014/09/24

Exploitable With

Core Impact

Metasploit (Apache mod_cgi Bash Environment Variable Code Injection (Shellshock))

Reference Information

CVE: CVE-2014-6271

BID: 70103

OSVDB: 112004

CERT: 252743

IAVA: 2014-A-0142

EDB-ID: 34765, 34766, 34777, 34860