The first thing to know, is this is a bad bug. Really nasty. Nastier than heart bleed.
The second thing to know, it is NOT a privilege escalation bug (in itself, but once you can run something on a server you have a vector to perform some other attacks against other things to escalate perhaps... keep your systems patched guys), you can't use this (on it's own) to get root. Of course, if your mental enough to run your web server as root that's a different matter, mentals shouldn't be server admins.
"CGI" is affected, but do not be fooled "I don't use bash CGI therefore safe" - if your, for example PHP, or perl or .... calls out with system() type commands which use a shell and the shell is bash, those dodgy env variables could get pushed through and executed. Once the variables have been injected to the web server, then anywhere in that process that bash could fire up is potentially a problem, it doesn't necessarily need to be a bash script CGI. If somebody looks and finds such a vector in say, wordpress, boy, that'd make for a fun time.
SSH is affected but this is really only of interest when your SSH session is normally command-restricted (that is, you have one command that it runs, or some set thereof), again, it's not giving somebody access to a server they didn't have access to already (I think) but it could give them the ability to run some command that they wouldn't normally be able to (but still have unix permissions which allow them to outside of SSH, so can't be that much of a problem).