POC详情: c3f9d05e3ba0483b2458e985607eddf34149ff9a

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
描述
Obsidian notes about CVE-2024-3094
介绍
# CVE-2024-3094

I've moved my notes in Obsidian to a separate vault and this GitHub repository to be able to share it.

The start page is [CVE-2024-3094 xz supply chain](./202403300902%20CVE-2024-3094%20xz%20supply%20chain.md).

## Installation

Clone the repo with `git`.

```
git clone https://github.com/reuteras/CVE-2024-3094.git
```

Then open the checked out folder as a vault in [Obsidian](https://obsidian.md/).
文件快照

[4.0K] /data/pocs/c3f9d05e3ba0483b2458e985607eddf34149ff9a ├── [ 13K] 202403300902 CVE-2024-3094 xz supply chain.md ├── [7.3K] 202403301312 CVE-2024-3094 -Jia Tan.md ├── [2.8K] 202403301317 CVE-2024-3094 - Lasse Collin.md ├── [ 584] 202403310857 CVE-2024-3094 - Hans Jansen.md ├── [ 681] 202403310919 xz.md ├── [6.5K] 202403310952 CVE-2024-3094 backdoor.md ├── [2.7K] 202404020708 smile.md ├── [1.5K] 202404020728 Tools and rules.md ├── [1.4K] 202404020805 Prevention.md ├── [ 639] 202404030944 Similar attempts.md ├── [ 313] 202404041707 Fallout.md ├── [4.0K] attachments │   ├── [ 40K] B5F089B1-FABC-4915-B65F-06F932A89661.jpg │   ├── [ 47K] ec9b20fdb20027a9.png │   ├── [ 17K] F64708B6-B703-4FE4-B5AD-92F343667685.jpg │   ├── [8.0K] injected-60.txt │   ├── [9.3K] injected-61.txt │   ├── [ 36K] liblzma_la_crc64_fast_5_6_0_o_gz.bin │   ├── [ 36K] liblzma_la_crc64_fast_5_6_1_o_gz.bin │   ├── [687K] Pasted image 20240331093406.png │   ├── [167K] Pasted image 20240331100021.png │   ├── [681K] Pasted image 20240331144449.png │   └── [230K] Pasted image 20240401072717.png ├── [4.0K] Canvas │   └── [4.9K] CVE-2024-3094.canvas ├── [ 420] README.md └── [4.0K] Templates ├── [ 211] ZettelkastenTemplate.md └── [ 233] ZettelkastenTemplateQA.md 3 directories, 26 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。