POC详情: a12d034d97adad114fca9f9a9d8b0006fbb4fead

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
介绍
# CVE-2024-3094 (XZ Backdoor) Tools

This repository contains tools for the XZ Backdoor vulnerability, also known as CVE-2024-3094.

## About CVE-2024-3094

CVE-2024-3094, also known as the XZ Backdoor, is a critical vulnerability discovered in the XZ data compression library.

For more information about the XZ Backdoor and CVE-2024-3094, please refer to the [JFrog blog post](https://jfrog.com/blog/xz-backdoor-attack-cve-2024-3094-all-you-need-to-know/), which provides both a comprehensive overview as well as a deeper analysis of the issue.

## CVE-2024-3094 Detector

The `cve-2024-3094-detector` tool in this repository is designed to scan files and directories for the presence of the XZ Backdoor vulnerability. It can be used to identify potentially vulnerable systems and take appropriate mitigation actions.

For more information about the CVE-2024-3094 detector tool, please visit the [cve-2024-3094-detector](https://github.com/jfrog/cve-2024-3094-tools/tree/main/cve-2024-3094-detector) folder in this repository.
文件快照

[4.0K] /data/pocs/a12d034d97adad114fca9f9a9d8b0006fbb4fead ├── [4.0K] cve-2024-3094-detector │   ├── [ 11K] cve-2024-3094-detector.sh │   └── [1.1K] README.md └── [1.0K] README.md 1 directory, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。