Certified Ethical Hacker 312-50v10 – Question080

What is the most common method to exploit the Bash Bug or ShellShock" vulnerability?


A.
Manipulate format strings in text fields
B. SSH
C. SYN Flood
D. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server

Correct Answer: D