Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

How Shellshock transformed the future of shell security

The Shellshock Bash bug left millions of systems unsecure. Enterprise threats expert Nick Lewis discusses how the bug changed shell security for the better.

Enterprises have gone from an age of vendors not patching bugs or acknowledging vulnerabilities to an age where...

a cute and entertaining name is required for every high-profile vulnerability.

These cute- and entertainingly-named vulnerabilities and attacks have gotten widespread attention outside of the information security industry, which has helped bring positive attention to many serious issues.

Shellshock is one of those vulnerabilities. In this tip, I will cover what the flaw is, the effect it has had on enterprises, and what it means for the future of shell security.

What is the Bourne Again Shell?

The Bourne Again Shell, better known as Bash, is a command-line shell and scripting language intended as a free replacement for the not freely available Bourne Shell. Bash is also a command processor that executes individual commands for user-typed command lines.

Bash has evolved into a powerful scripting language and is included by default on most Linux and Unix distributions, including Mac OS X.

Shellshock had massive media coverage from the time of its disclosure and has prompted enterprises to assess if their systems are vulnerable.

Some Bash scripts may be used for Web scripts, since it is an easy-to-use scripting language. But since it wasn't intended as a Web scripting language and there are other languages that are relatively easy to use, it is not widely used for Web applications. Any Web application using Bash would be limited to the same access as the user the script was run under, in most cases a non-privileged user. While most enterprises do not use Bash scripts for Web applications, many use Bash shell scripts in system administration tasks. Some hardware vendors also use Bash since it is easy to automate hardware maintenance tasks to include in an administrative Web interface to manage a device over the network.

The effect Shellshock has had on enterprises

The Shellshock flaw is a collection of vulnerabilities identified in Bash that allow an attacker to execute Bash commands on unauthenticated remote hosts. The vulnerabilities lie in how Bash sets and interprets environment variables used in scripts. Not all vulnerable systems have the same level of risk; high-risk systems are ones that use Bash for Web applications. However, Bash vulnerabilities can still be exploited in many other ways. Shellshock had massive media coverage from the time of its disclosure and has prompted enterprises to assess if their systems are vulnerable. As similar widespread vulnerabilities have been identified, enterprises have realized the benefits of being able to scan their networks quickly for the vulnerability and then deploy patches to a large number of systems in a timely manner. Many of the vulnerable systems may not be normally centrally managed (like IP cameras, network-attached storage and other systems) and will require manual interaction unless they are set to auto-update.

Incorporating defense-in-depth controls to a system using Bash scripts -- such as running the scripts as a non-privileged user, using SELinux or AppArmor to strictly limit what the user running Bash has access to, or using the restricted option in Bash -- could help limit the risk from Shellshock or future Bash vulnerabilities. A Web application, intrusion prevention system or next-generation firewall may also block attacks over the network.

What Shellshock means for the future of shell scripting security

Shellshock has brought some needed attention to shell scripting security in a way that Heartbleed didn't for other components of the open source ecosystem.

Shellshock has brought much-needed attention to the security of open source software.

Shellshock should cause software developers to migrate to secure scripting languages that are specially designed for the task at hand rather than general-purpose scripting languages. This will help limit the risks from the additional functionality of the general-purpose scripting languages. It may also prompt developers to use secure software development lifecycles, as well as include input validation and defensive programming in future developments.

The need for shell scripts will always exist, so migrating to languages that have been designed with security in mind is essential. A new scripting language named Shill was developed by Harvard researchers with a focus on security to strictly limit access to only what is needed, but it has a long way to go before it should be adopted by enterprises. Other similar languages will likely appear in the future, or similar concepts might be incorporated into other shell scripting languages.

Conclusion

Shellshock has brought much-needed attention to the security of open source software. Many pieces of open source software are widely used, but are supported by only minimal resources. Bash, SSL and whatever the next widely used piece of software identified with a significant vulnerability is will need additional attention and resources to ensure the long-term security of the systems they are used on.

As the open source community examines the core components of the software ecosystem, more software projects will be identified that will need additional resources to ensure the security of the system.

About the author:
Nick Lewis, CISSP, is a program manager for the Trust and Identity in Education and Research initiative at Internet2, and previously was an information security officer at Saint Louis University. Nick received Master of Science degrees in information assurance from Norwich University in 2005 and in telecommunications from Michigan State University in 2002.

Next Steps

Uncover the network security lessons that can be learned from Shellshock

This was last published in March 2015

Dig Deeper on Alternative operating system security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How has Shellshock changed the way your enterprise approaches shell security?
Cancel
The Shellshock flaw has changed our perception on shell security as it allows for Bash attackers to execute Bash commands. This is just but one way in which Bash vulnerabilities can be exploited. This has propelled us into developing systems that initiate network scanning within high speeds hence denoting vulnerability and deploying specified patches in a timely manner to cover the loop. They also come with in-built configurations that allow for automatic updates.
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close