POC详情: 7929c10b1fa61306e65561c18ddbaa5520c71b93

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
描述
The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094.
介绍
# CVE-2024-3094-Checker
The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094.

# Disclaimer:
1. This script is provided without any warranty, express or implied.
2. By choosing to execute this script, you accept full responsibility for any consequences that may arise.
3. The author(s) disclaim liability for any damages or issues, including data loss or system instability, resulting from its use.
4. Before running this script, it is advisable to carefully review its functionality and ensure appropriate backups are in place.
5. Your use of this script implies your acknowledgment and acceptance of these terms.
   ~Author: TheTorjanCaptain


# Installation

1. Download the code(Hope you know how) or copy the raw data to a .sh file.
2. chmod +x filename.sh
3. ./filename.sh


# Mitigations
Please upgrade to a latest version or downgrade to a stable version.
文件快照

[4.0K] /data/pocs/7929c10b1fa61306e65561c18ddbaa5520c71b93 ├── [2.2K] CVE-2024-3094-Checker.sh ├── [1.0K] LICENSE └── [ 938] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。