POC详情: 29243a0ff8e5dd5c731c7118c70673353a64a787

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
介绍
# CVE-2024-3094 Detection and Remediation Script

This script is designed to detect and remediate a critical vulnerability, CVE-2024-3094, which affects the XZ Utils data compression library. The vulnerability was highlighted in a CISA Alert and has significant implications for system security. This Bash script offers both detection and remediation functionalities.

## Disclaimer

This script is provided "AS IS", without warranty of any kind. It has not been thoroughly tested across all environments and configurations. By running this script, you acknowledge and accept that you do so at your own risk.

## Usage

Clone the repository:

```shell
git clone https://github.com/hazemkya/CVE-2024-3094-checker.git
cd CVE-2024-3094-checker
```

**Default Detection Mode:** By default, the script operates in detection mode to only detect if your system is vulnerable.
```bash
./CVE-2024-3094-checker.sh
```

**Remediation Mode:** By using the -r flag, the script switches to remediation mode, where it attempts to fix the vulnerability by installing a safe version of xz-utils.
```bash
./CVE-2024-3094-checker.sh -r
```

## Refrences
- https://nvd.nist.gov/vuln/detail/CVE-2024-3094
- https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094
- https://www.openwall.com/lists/oss-security/2024/03/29/4
文件快照

[4.0K] /data/pocs/29243a0ff8e5dd5c731c7118c70673353a64a787 ├── [2.5K] CVE-2024-3094-checker.sh └── [1.4K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。