- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Anyone use bash?
Collapse
X
-
-
The problem is particularly serious given that many web servers are run using the Apache system, software which includes the Bash component.
I'm no sandal-wearing Linux expert but isn't it part of the OS, not the web server? -
Comment
-
Comment
-
The exploit allows you to access the webserver remotely via bash....Originally posted by Bunk View Post
I'm no sandal-wearing Linux expert but isn't it part of the OS, not the web server?Comment
-
But bash is a command line IIRC. Surely that means you need to have logged onto the machine to get the command line to do any damage?Originally posted by stek View PostThe exploit allows you to access the webserver remotely via bash....Will work inside IR35. Or for food.Comment
-
I think the exploit can give extra privs in the manner of the old Emacs exploit.Originally posted by VectraMan View PostBut bash is a command line IIRC. Surely that means you need to have logged onto the machine to get the command line to do any damage?Comment
-
CGI uses the system shell, which is usually bash. One nice (?) demo I saw last night involved changing the User-Agent header on a request. When processed by a vulnerable web server (e.g. one running PHP-as-CGI, or one with a cgi-bin script that parsed request headers) it allowed execution of arbitrary shell commands on the server.Originally posted by Bunk View Post
I'm no sandal-wearing Linux expert but isn't it part of the OS, not the web server?Comment
-
The web server is running as a logged-on user (usually something like www:www or apache:apache). It allows you to run arbitrary commands with the same privileges as that user, which is clearly a Bad Thing. In particular, even if the web server user is restricted to certain commands, it allows you to override those restrictions, and run whatever you like with a simple request to port 80.Originally posted by VectraMan View PostBut bash is a command line IIRC. Surely that means you need to have logged onto the machine to get the command line to do any damage?
If this was combined with a zero-day privilege escalation vulnerability within bash, then the bad guys could root a server with nothing more than a single request using curl. Not good
Comment
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- New UK crypto rules now apply. Here’s how mandatory reporting affects contractors Today 07:03
- What the Ray McCann Loan Charge Review means for contractors Yesterday 06:21
- IT contractor demand defied seasonal slump in December 2025 Jan 13 07:10
- Five tax return hacks for contractors as Jan 31st looms Jan 12 07:45
- How to land a temporary technology job in 2026 Jan 9 07:01
- Spring Forecast 2026 ‘won’t put up taxes on contractors’ Jan 8 07:26
- Six things coming to contractors in 2026: a year of change, caution and (maybe) opportunity Jan 7 06:24
- Umbrella companies, beware JSL tunnel vision now that the Employment Rights Act is law Jan 6 06:11
- 26 predictions for UK IT contracting in 2026 Jan 5 07:17
- How salary sacrifice pension changes will hit contractors Dec 24 07:48

Comment