TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

As a small-time dev do I have to worry about shellshock?

3 pointsby fifthesteightover 10 years ago
I have an extremely small team, lots of projects and no resources or capacity to spend on securing our web applications. I host with one of the big guys, we don&#x27;t run our servers from our shop or anything like that.<p>Without the capacity to spare man-hours battening down the hatches- how big of a deal is being on top of this for a run-of-the-mill dev team with low-level, no-big-deal development, hosted elsewhere?<p>My main concern is unwittingly leaving clients servers&#x2F;applications vulnerable and them falling under nefarious control...

3 comments

jestar_jokinover 10 years ago
It&#x27;s a big deal, especially for small dev shops, as they&#x27;re less likely to have people available to plug security holes or monitor servers for vulnerabilities&#x2F;compromises. If you&#x27;re using shared hosting, probably not an issue. If you&#x27;re using a VPS, PS, or other service where you are expected to maintain the server, well...<p>For some systems, it&#x27;s just a matter of logging in to the server and running a single command line, like &quot;sudo yum update bash&quot; (replace &quot;yum&quot; with apt-get, or another package manager).<p>You can leave it, but know that you&#x27;re leaving your clients vulnerable to things such as:<p>- stolen data - data loss - compromised&#x2F;corrupted&#x2F;deleted backups of data, code - site disruption - botnet participation - illegal file dump&#x2F;trading space - unremovable rootkits<p>Having said that, I believe you should be safe if you don&#x27;t use CGI to run your apps.<p>The earlier you plug the holes, the better.
评论 #8421156 未加载
lastofusover 10 years ago
Someone is responsible for maintaining&#x2F;patching your servers. Either you are, or you are paying someone to do it.<p>If you are paying a company to do it, send &#x27;em an email. If you are responsible, look into what it takes to install a bash upgrade. I was able to patch my own Ubuntu VMs in about shell 3 commands manually through SSH (yay apt-get). Took all of 10 mins reading up on documentation, logging in, hitting yes to prompts...<p>In all seriousness, the patching process shouldn&#x27;t be too much more involved than patching your desktop OS for a small shop not worried about 100s of servers, load balancers&#x2F;failover mechanisms, SLAs, etc...
评论 #8421188 未加载
sippndippover 10 years ago
You should test your sites with these two tools:<p><a href="http://www.shellshocktest.com/" rel="nofollow">http:&#x2F;&#x2F;www.shellshocktest.com&#x2F;</a><p>and<p><a href="http://shellshock.brandonpotter.com/" rel="nofollow">http:&#x2F;&#x2F;shellshock.brandonpotter.com&#x2F;</a><p>There is a well maintained guide at Digital Ocean that explains the nitty gritty details:<p><a href="https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability" rel="nofollow">https:&#x2F;&#x2F;www.digitalocean.com&#x2F;community&#x2F;tutorials&#x2F;how-to-prot...</a><p>If a server is vulnerable there is a great guide that helps you to deal even with old systems:<p><a href="https://dmsimard.com/2014/09/25/the-bash-cve-2014-6271-shellshock-vulnerability/" rel="nofollow">https:&#x2F;&#x2F;dmsimard.com&#x2F;2014&#x2F;09&#x2F;25&#x2F;the-bash-cve-2014-6271-shell...</a>
评论 #8419236 未加载