On 9/26/2014 3:36 PM, Valeri Galtsev wrote:
On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
>On 9/26/2014 2:51 PM, Always Learning wrote:
>>Probably all Windoze
>
>linux apache web servers with the bash exploit are getting owned en
>masse today.     my (patched) internet web server has logged 100s and
>100s of attempts like...
>
>66.186.2.172 - - [26/Sep/2014:00:49:29 -0700] "GET /cgi-bin/test.sh
I feel really stupid, but I have to ask. If your server wasn't patched, it
only would have owned by the above if that file exists, is executable by
apache and it indeed invokes bash (say, has #!/bin/bash or whatever bash
location is as first line), right?

no. mod_cgi launches /bin/sh and passes it the command, even if the file doesn't exist. and /bin/sh is linked to bash



--
john r pierce                                      37N 122W
somewhere on the middle of the left coast

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to