POC详情: 35bb465c1d255d51b1ebe445d5792ec223bc7c22

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
描述
Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor)
介绍
# ansible-CVE-2024-3094
Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor). These were developed with guidance from https://jfrog.com/blog/xz-backdoor-attack-cve-2024-3094-all-you-need-to-know/.

## Background
Running the checks to see if your Linux system is vulnerable is simple if it's only one or two systems, but what if you have a fleet of systems to manage? This is my humble attempt to make the automation of this process a little easier.

This has been tested on Ubuntu 22.04.

## Instructions

### Preflight
1) Clone the repo to your Ansible control node.
2) Prepare your hosts file in either INI or YML format.
3) Run the `preflight.sh` file to ensure you have the latest version from JFrog

### CVE-2024-3094 Check
1) Run the playbook with the following command:

`ansible-playbook -i <insert_hosts_file_here> CVE-2024-3094-check.yml`

### CVE-2024-3094 Fix
1) If needed, run the playbook with the following command:

`ansible-playbook -i <insert_hosts_file_here> CVE-2024-3094-fix.yml`

2) For further peace of mind, rerun the Check playbook.

### Results
Each playbook will produce text files in a `results` directory for each host.
文件快照

[4.0K] /data/pocs/35bb465c1d255d51b1ebe445d5792ec223bc7c22 ├── [2.2K] CVE-2024-3094-check.yml ├── [ 827] CVE-2024-3094-fix.yml ├── [4.0K] cve-2024-3094-tools ├── [ 125] hosts.ini.template ├── [ 189] hosts.yml.template ├── [1.0K] LICENSE ├── [ 712] playbook.yml.template ├── [ 409] preflight.sh └── [1.1K] README.md 1 directory, 8 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。