POC详情: a3ffd9b0dbd0f374d5f2d40790ba46f8468931e3

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
介绍
# CVE-2024-3094-detect
## XZ Utils Vulnerability Check and Downgrade Script

This script is designed to check the version of XZ Utils installed on your Linux system and downgrade it to a safe version if necessary. It also detects the Linux distribution and the package manager used.

## Features

- Checks the installed version of XZ Utils and identifies if it's vulnerable.
- Detects the Linux distribution (Fedora, Debian, openSUSE, Kali Linux).
- Downgrades XZ Utils to a safe version if needed.

## Prerequisites

- Bash shell (most Linux distributions come with Bash pre-installed).
- Superuser (root) privileges to perform the downgrade operation.

## Usage

1. Download the script (`detect-cve-2024-3094.sh`) to your Linux system.
2. Open a terminal and navigate to the directory containing the script.
3. Make the script executable with the command:
   ```bash
   chmod +x detect-cve-2024-3094.sh
4. Run the script as root (or with sudo) using the command:
   ```bash
   sudo ./detect-cve-2024-3094.sh
文件快照

[4.0K] /data/pocs/a3ffd9b0dbd0f374d5f2d40790ba46f8468931e3 ├── [2.7K] detect-cve-2024-3094.sh └── [1010] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。