I was just fooling around, and BAM! It happened! I wrote { :; }; echo " lolloloolooll"
And, it did! Please share this, osmc needs to see it very badly, nobody should be able to execute code without restrictions!
I have even written a script that uses guest privlages to get root! I will not show this script untill the shell is patched.
This isn’t reddit.
2 Likes
You seem to be talking about the old Shellshock vulnerability that was fixed in 2014. Trying the Shellshock on my Pi:
osmc@kaled:/media/brian$ env x=‘() { :;}; echo vulnerable’ bash -c “echo this is a test”
this is a test
osmc@kaled:/media/brian$
That shows that OSMC is properly patched. If you have found a new problem, you should report it to the bash developers.
3 Likes
3 Likes