SlideShare a Scribd company logo
Was the Cloud ShellShocked? 
Internet security has reached the highest defcon level. Another day, another hack – the 
new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds. 
Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the widely-used 
shell for Unix-based operating systems such as Linux and OS X. The bug allows the 
perpetrator to remotely execute commands on vulnerable ports. The vulnerability is 
extremely easy to exploit, not requiring extensive knowledge of application or 
computational resources. The extensive functionality, along with the relative ease of 
launching an attack, led industry analysts to label the bug more serious than 
Heartbleed. The National Institute of Standards and Technology assigned the 
vulnerability their highest risk score of 10. 
What are the implications of ShellShock for Cloud Security? At Skyhigh, we 
reviewed enterprise use of over 7,000 cloud service providers for vulnerabilities. The 
results surprised us. 
We initially expected to discover rampant vulnerability to Shellshock amongst cloud 
service providers. The data portrayed a more mixed-bag of cloud application security. 
4% of end-user devices in the enterprise environment employ the vulnerable version 
of Bash on employee devices – reflecting the dominance of Windows in enterprise 
networks. We also found that only three cloud service providers employ common 
gateway interface (CGI), the primary vector of attack. While cloud service providers 
may be vulnerable through other vectors (i.e. ForceCommand), the fact that they 
avoid the primary attack vector of the bug through design and architectural 
complexity is an indication of the maturity of today’s cloud applications. 
However, when we scanned the top IaaS providers(e.g. AWS, Rackspace) for the Bash 
vulnerability, 90% of checks reported the vulnerable Bash version on the default 
images provisioned. Customers should not wait and rely on their IaaS providers to 
take the initiative. To ensure immunity from ShellShock, all organizations should
immediately update their systems with the latest version of Bash. 
But remediation measures shouldn’t end there. Given the current rate of breaches, 
organizations can expect the next event won’t be far off. Our recommendation: A Web 
Application Firewall (WAF) deployed to protect against pre-defined attack vectors 
can come in handy at times like this. System administrators can quickly write rules for 
WAFs to defend against this and similar bugs. In our case, we quickly updated our 
WAF rules in addition to updating the vulnerable Bash version. 
A Sample ruleset for mod_security (WAF) is as below: 
Request Header values: 
SecRule REQUEST_HEADERS “^() {” 
“phase:1,deny,id:1000000,t:urlDecode,status:400,log,msg:’CVE-2014-6271 – Bash 
Attack’” 
SERVER_PROTOCOL values: 
SecRule REQUEST_LINE “() {” 
“phase:1,deny,id:1000001,status:400,log,msg:’CVE-2014-6271 – Bash Attack’” 
GET/POST names: 
SecRule ARGS_NAMES “^() {” 
“phase:2,deny,id:1000002,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014 
-6271 – Bash Attack’” 
GET/POST values: 
SecRule ARGS “^() {” 
“phase:2,deny,id:1000003,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014 
-6271 – Bash Attack’”
File names for uploads: 
SecRule FILES_NAMES “^() {” 
“phase:2,deny,id:1000004,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014 
-6271 – Bash Attack’” 
Author : 
Lauren Ellis is a research analyst covering the technology industry’s top trends & 
topics, focusing on Cloud Security, Cloud Computing, Data Loss Prevention etc.,

More Related Content

PDF
CSS17: Houston - Protecting Web Apps
PPTX
Are You Ready for a Cloud Pentest?
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PDF
Owasp and friends
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPTX
Silver Lining: An Everyman's Journey to Cloud Security - Sven Skoog, Monotype
PPTX
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
PDF
Make your OpenStack Cloud Self-Defending with VESPA!
CSS17: Houston - Protecting Web Apps
Are You Ready for a Cloud Pentest?
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Owasp and friends
CSS17: Houston - Azure Shared Security Model Overview
Silver Lining: An Everyman's Journey to Cloud Security - Sven Skoog, Monotype
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Make your OpenStack Cloud Self-Defending with VESPA!

What's hot (20)

PPTX
Practical DevSecOps Using Security Instrumentation
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
PPTX
Lacework for AWS Security Overview
PDF
5 ways to use devops in product infrastructure management final
PDF
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
PDF
Protecting Against Web App Attacks
PDF
Stories from the Security Operations Center (S.O.C.)
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PDF
Protecting Against Web Attacks
PPTX
Power of the cloud - Introduction to azure security
PPTX
Best Practices to Secure Your Kubernetes Cluster
PDF
SHOWDOWN: Threat Stack vs. Red Hat AuditD
PDF
Dev week cloud world conf2021
PDF
The Intersection of Security and DevOps
PPTX
Settle the Score
PPTX
How Malware Works - Understanding Software Vulnerabilities
PPTX
Splunk Enterprise Security
Practical DevSecOps Using Security Instrumentation
#ALSummit: Alert Logic & AWS - AWS Security Services
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - Protecting your Web Applications
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
Lacework for AWS Security Overview
5 ways to use devops in product infrastructure management final
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
Protecting Against Web App Attacks
Stories from the Security Operations Center (S.O.C.)
Global Azure Bootcamp 2018 - Azure Security Center
Protecting Against Web Attacks
Power of the cloud - Introduction to azure security
Best Practices to Secure Your Kubernetes Cluster
SHOWDOWN: Threat Stack vs. Red Hat AuditD
Dev week cloud world conf2021
The Intersection of Security and DevOps
Settle the Score
How Malware Works - Understanding Software Vulnerabilities
Splunk Enterprise Security
Ad

Similar to Was the cloud shell shocked (20)

PDF
Shellshock - A Software Bug
DOCX
The Bash Bug explained !
PDF
ShellShock (Software BASH Bug)
DOCX
Article on shellshock
PDF
Bash Code-Injection Briefing
PPTX
Shell Shock (Bash Bug)
PDF
Radware ERT Threat Alert: Shellshock Bash
RTF
Bash software bug could be bigger threat than heartbleed, experts warn
PPTX
The Shellshocker
PPTX
Lacework | Top 10 Cloud Security Threats
PDF
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
PPTX
The bash vulnerability practical tips to secure your environment
PPTX
Security Walls in Linux Environment: Practice, Experience, and Results
PDF
如何让开源软件用得更放心
PPTX
Shellshock & Poodle Attacks, fix
PPTX
Shellshock- from bug towards vulnerability
PDF
Shellshock
PPTX
How to protect my cloud workload from Ransomware?
PDF
Using Linux Securely in the Cloud
PDF
Cloud Security Engineering - Tools and Techniques
Shellshock - A Software Bug
The Bash Bug explained !
ShellShock (Software BASH Bug)
Article on shellshock
Bash Code-Injection Briefing
Shell Shock (Bash Bug)
Radware ERT Threat Alert: Shellshock Bash
Bash software bug could be bigger threat than heartbleed, experts warn
The Shellshocker
Lacework | Top 10 Cloud Security Threats
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
The bash vulnerability practical tips to secure your environment
Security Walls in Linux Environment: Practice, Experience, and Results
如何让开源软件用得更放心
Shellshock & Poodle Attacks, fix
Shellshock- from bug towards vulnerability
Shellshock
How to protect my cloud workload from Ransomware?
Using Linux Securely in the Cloud
Cloud Security Engineering - Tools and Techniques
Ad

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Hybrid model detection and classification of lung cancer
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Tartificialntelligence_presentation.pptx
PDF
August Patch Tuesday
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A contest of sentiment analysis: k-nearest neighbor versus neural network
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
O2C Customer Invoices to Receipt V15A.pptx
Architecture types and enterprise applications.pdf
Enhancing emotion recognition model for a student engagement use case through...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
cloud_computing_Infrastucture_as_cloud_p
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DP Operators-handbook-extract for the Mautical Institute
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Hybrid model detection and classification of lung cancer
NewMind AI Weekly Chronicles – August ’25 Week III
Getting started with AI Agents and Multi-Agent Systems
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Tartificialntelligence_presentation.pptx
August Patch Tuesday
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game

Was the cloud shell shocked

  • 1. Was the Cloud ShellShocked? Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds. Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the widely-used shell for Unix-based operating systems such as Linux and OS X. The bug allows the perpetrator to remotely execute commands on vulnerable ports. The vulnerability is extremely easy to exploit, not requiring extensive knowledge of application or computational resources. The extensive functionality, along with the relative ease of launching an attack, led industry analysts to label the bug more serious than Heartbleed. The National Institute of Standards and Technology assigned the vulnerability their highest risk score of 10. What are the implications of ShellShock for Cloud Security? At Skyhigh, we reviewed enterprise use of over 7,000 cloud service providers for vulnerabilities. The results surprised us. We initially expected to discover rampant vulnerability to Shellshock amongst cloud service providers. The data portrayed a more mixed-bag of cloud application security. 4% of end-user devices in the enterprise environment employ the vulnerable version of Bash on employee devices – reflecting the dominance of Windows in enterprise networks. We also found that only three cloud service providers employ common gateway interface (CGI), the primary vector of attack. While cloud service providers may be vulnerable through other vectors (i.e. ForceCommand), the fact that they avoid the primary attack vector of the bug through design and architectural complexity is an indication of the maturity of today’s cloud applications. However, when we scanned the top IaaS providers(e.g. AWS, Rackspace) for the Bash vulnerability, 90% of checks reported the vulnerable Bash version on the default images provisioned. Customers should not wait and rely on their IaaS providers to take the initiative. To ensure immunity from ShellShock, all organizations should
  • 2. immediately update their systems with the latest version of Bash. But remediation measures shouldn’t end there. Given the current rate of breaches, organizations can expect the next event won’t be far off. Our recommendation: A Web Application Firewall (WAF) deployed to protect against pre-defined attack vectors can come in handy at times like this. System administrators can quickly write rules for WAFs to defend against this and similar bugs. In our case, we quickly updated our WAF rules in addition to updating the vulnerable Bash version. A Sample ruleset for mod_security (WAF) is as below: Request Header values: SecRule REQUEST_HEADERS “^() {” “phase:1,deny,id:1000000,t:urlDecode,status:400,log,msg:’CVE-2014-6271 – Bash Attack’” SERVER_PROTOCOL values: SecRule REQUEST_LINE “() {” “phase:1,deny,id:1000001,status:400,log,msg:’CVE-2014-6271 – Bash Attack’” GET/POST names: SecRule ARGS_NAMES “^() {” “phase:2,deny,id:1000002,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014 -6271 – Bash Attack’” GET/POST values: SecRule ARGS “^() {” “phase:2,deny,id:1000003,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014 -6271 – Bash Attack’”
  • 3. File names for uploads: SecRule FILES_NAMES “^() {” “phase:2,deny,id:1000004,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014 -6271 – Bash Attack’” Author : Lauren Ellis is a research analyst covering the technology industry’s top trends & topics, focusing on Cloud Security, Cloud Computing, Data Loss Prevention etc.,