Archive
012
EXH-0122014Fictional reconstruction

Envoi

September 24, 2014. Someone realises you can stash arbitrary bash commands in HTTP headers and have them executed by CGI scripts. Half the web runs bash as `/bin/sh`.

Type
Classic
Difficulty
Intermediate
Era
2010s
Time
9 min

Briefing

Apache still has `/cgi-bin/` turned on for some PHP-era apps. Attackers probe with crafted `User-Agent`/`Cookie` strings that start with `() { :; };`. Your job is log forensics only.

Your role

On-call engineer triaging a botnet's sweep through your leftover CGI directory.

Objective

Recognise the CVE-2014-6271 pattern in access logs and tie it to bash parsing function exports.

Terminal environment

user
responder
host
apache-bridge
cwd
/var/log/www-legacy
steps
3
Enter the terminalAbout 9 minutesSafe simulation

Safety note. This is a safe reconstruction. All systems, files, hosts, credentials, and outputs are simulated. Do not use these techniques on systems you do not own or have explicit permission to test.