A revised google shellshock google dorker that uses the chrome/chromium webdriver
Obviously change the chromedriver path to the path with your binary (line 55)
Search Google and concurrently test each result for vulnerability to CVE-2014-6271: remote code execute bug in bash otherwise known as Shellshock.
Credits in the source (line 24)
Requires Python 2.7
pip install --user selenium gevent
git clone https://github.com/capisano/shellshock-scanner-chrome/
cd shellshock-scanner-chrome/
python ShellShock_Bot.py -s "inurl:cgi-bin filetype:sh" -p 2
Open up Chrome/Chromium, it will search for the dork "inurl:cgi-bin filetype:sh", and visit the first two pages of results where one page = 100 results. Then it will test each result URL for Shellshock vulnerability. -p option will default to 1 page if not given.
Output will look like:
[!] SHELLSHOCK VULNERABLE: http://domain.com/cgi-bin/script.sh
- inurl:"server-status" intitle:apache "cgi-bin"
- sitemap.xml filetype:xml intext:"cgi-bin"
- filetype:sh inurl:cgi-bin
- inurl:cgi-bin "GATEWAY_INTERFACE = CGI"
- inurl:cgi-bin inurl:printenv intext:SERVER_ADDR