POC详情: 058e3c8614307eb4bd067ada1f1b80cdd2c1880a

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
描述
An ssh honeypot with the XZ backdoor. CVE-2024-3094
介绍
# xz-vulnerable-honeypot

An ssh honeypot with the XZ backdoor. CVE-2024-3094

**TODO**: hook the backdoor and/or sshd. log rsa keys for decryption.

notes:
- https://gist.github.com/smx-smx/a6112d54777845d389bd7126d6e9f504
- https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01
- https://github.com/hamarituc/xz-backdoor

## Warning

**PLEASE run this on a separate isolated system. Docker is configured in a way that allows a threat actor to easily escape it.
Docker is only used to get all the shared libraries working and configured.**

## Installation

Install [notify](https://github.com/projectdiscovery/notify) by projectdiscovery using the following command:

```bash
go install -v github.com/projectdiscovery/notify/cmd/notify@latest
```

Run the following command to start the honeypot:

```bash
./monitor.sh DISCORD_WEBHOOK_URL
```

e.g.

```bash
./monitor.sh https://discord.com/api/webhooks/12345678909876/aaaaaaaa
```

This will use [notify](https://github.com/projectdiscovery/notify) to send all logs to a discord webhook.

## How it works

The vulnerable version of xz (5.6.1) and the liblzma linked version of sshd from the fedora repositories are ran in the configuration that activates the backdoor. Monitoring is provided by `bpftrace`, `strace`, `tcpdump`, and the `sshd` process itself.

- `bpftrace`
  - Syscall monitoring and shared library hooking.
- `strace`
  - Syscall montioring for the parent `sshd` process.
- `tcpdump`
  - Capturing packets.
- `sshd`
  - Login events (**NOTE** This will most likely not capture the login event for a bad actor as the backdoor uses `set_log_mask` to change the logging behaviour when the attacker attempts to login)
文件快照

[4.0K] /data/pocs/058e3c8614307eb4bd067ada1f1b80cdd2c1880a ├── [4.0K] container │   └── [ 808] run.sh ├── [ 246] docker-compose.yml ├── [ 280] Dockerfile ├── [ 18K] LICENSE ├── [ 687] monitor.sh └── [1.7K] README.md 1 directory, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。