Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
GNU Bash Environment Variable Handling Shell Remote Command Execution Vulnerability(SIP Check)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with GNU Bash Shell and is prone to remote command execution vulnerability.
Insight
Insight
GNU bash contains a flaw that is triggered when evaluating environment variables passed from another environment. After processing a function definition, bash continues to process trailing strings. The exec module in Kamailio, Opensips and probably every other SER fork passes the received SIP headers as environment variables to the invoking shell. A proxy is vulnerable using any of the exec functions and has the 'setvars' parameter set to the default value '1'.
Affected Software
Affected Software
GNU Bash through 4.3
Detection Method
Detection Method
Send a crafted command via SIP INVITE request and check remote command execution.
Solution
Solution
Apply the patch or upgrade to latest version.