Shellshcok!

I was just fooling around, and BAM! It happened! I wrote { :; }; echo " lolloloolooll"
And, it did! Please share this, osmc needs to see it very badly, nobody should be able to execute code without restrictions!
I have even written a script that uses guest privlages to get root! I will not show this script untill the shell is patched.

This isn’t reddit.

2 Likes

You seem to be talking about the old Shellshock vulnerability that was fixed in 2014. Trying the Shellshock on my Pi:

osmc@kaled:/media/brian$ env x=‘() { :;}; echo vulnerable’ bash -c “echo this is a test”
this is a test
osmc@kaled:/media/brian$

That shows that OSMC is properly patched. If you have found a new problem, you should report it to the bash developers.

3 Likes

@bmillham indeed

@CaNsA might wanna try and not ridicule every user that reports something

2 Likes

3 Likes