Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3094— Xz: malicious code in distributed source

CVSS 10.0 · Critical EPSS 84.80% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-3094

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Xz: malicious code in distributed source
Source: NVD (National Vulnerability Database)
Vulnerability Description
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
内嵌的恶意代码
Source: NVD (National Vulnerability Database)
Vulnerability Title
xz 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat JBoss Enterprise Application Platform 8-cpe:/a:redhat:jboss_enterprise_application_platform:8

II. Public POCs for CVE-2024-3094

#POC DescriptionSource LinkShenlong Link
1Information for CVE-2024-3094https://github.com/byinarie/CVE-2024-3094-infoPOC Details
2Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)https://github.com/FabioBaroni/CVE-2024-3094-checkerPOC Details
3Verify that your XZ Utils version is not vulnerable to CVE-2024-3094https://github.com/lypd0/CVE-2024-3094-Vulnerabity-CheckerPOC Details
4Nonehttps://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094POC Details
5Script to detect CVE-2024-3094.https://github.com/bioless/xz_cve-2024-3094_detectionPOC Details
6This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the "xz" utility, as specified by CVE-2024-3094.https://github.com/Hacker-Hermanos/CVE-2024-3094_xz_checkPOC Details
7Nonehttps://github.com/Fractal-Tess/CVE-2024-3094POC Details
8Nonehttps://github.com/wgetnz/CVE-2024-3094-checkPOC Details
9History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.https://github.com/emirkmo/xz-backdoor-githubPOC Details
10xz exploit to privilege escalation in Linuxhttps://github.com/Jooose001/CVE-2024-3094-EXPLOITPOC Details
11Nonehttps://github.com/ashwani95/CVE-2024-3094POC Details
12Checker for CVE-2024-3094 where malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code.https://github.com/harekrishnarai/xz-utils-vuln-checkerPOC Details
13K8S and Docker Vulnerability Check for CVE-2024-3094https://github.com/teyhouse/CVE-2024-3094POC Details
14This project contains a shell script designed to help users identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6).https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-FixerPOC Details
15Nonehttps://github.com/Horizon-Software-Development/CVE-2024-3094POC Details
16Nonehttps://github.com/hazemkya/CVE-2024-3094-checkerPOC Details
17An ssh honeypot with the XZ backdoor. CVE-2024-3094https://github.com/lockness-Ko/xz-vulnerable-honeypotPOC Details
18Nonehttps://github.com/brinhosa/CVE-2024-3094-One-LinerPOC Details
19CVE-2024-3094https://github.com/isuruwa/CVE-2024-3094POC Details
20Nonehttps://github.com/k4t3pr0/Check-CVE-2024-3094POC Details
21A script to detect if xz is vulnerable - CVE-2024-3094https://github.com/Yuma-Tsushima07/CVE-2024-3094POC Details
22Nonehttps://github.com/jfrog/cve-2024-3094-toolsPOC Details
23Nonehttps://github.com/krascovict/OSINT---CVE-2024-3094-POC Details
24Ansible playbook for patching CVE-2024-3094https://github.com/Simplifi-ED/CVE-2024-3094-patcherPOC Details
25Nonehttps://github.com/gayatriracha/CVE-2024-3094-Nmap-NSE-scriptPOC Details
26Nonehttps://github.com/Mustafa1986/CVE-2024-3094POC Details
27XZ-Utils工具库恶意后门植入漏洞(CVE-2024-3094)https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094POC Details
28Nonehttps://github.com/galacticquest/cve-2024-3094-detectPOC Details
29Nonehttps://github.com/zgimszhd61/cve-2024-3094-detect-toolPOC Details
30Nonehttps://github.com/mightysai1997/CVE-2024-3094-infoPOC Details
31Nonehttps://github.com/mightysai1997/CVE-2024-3094POC Details
32CVE-2024-3094https://github.com/mesutgungor/xz-backdoor-vulnerabilityPOC Details
33Obsidian notes about CVE-2024-3094https://github.com/reuteras/CVE-2024-3094POC Details
34notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)https://github.com/amlweems/xzbotPOC Details
35Checker - CVE-2024-3094https://github.com/gustavorobertux/CVE-2024-3094POC Details
36Nonehttps://github.com/ackemed/detectar_cve-2024-3094POC Details
37XZ Backdoor Extracthttps://github.com/0xlane/xz-cve-2024-3094POC Details
38Nonehttps://github.com/dah4k/CVE-2024-3094POC Details
39Script en bash para revisar si tienes la vulnerabilidad CVE-2024-3094.https://github.com/hackingetico21/revisaxzutilsPOC Details
40CVE-2024-3094 XZ Backdoor Detectorhttps://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-DetectorPOC Details
41Detectar CVE-2024-3094https://github.com/ScrimForever/CVE-2024-3094POC Details
42CVE-2024-3094 - Checker (fix for arch etc)https://github.com/pentestfunctions/CVE-2024-3094POC Details
43Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094https://github.com/r0binak/xzk8sPOC Details
44apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related linkshttps://github.com/przemoc/xz-backdoor-linksPOC Details
45Our current information about the CVE-2024-3094 backdoor.https://github.com/CyberGuard-Foundation/CVE-2024-3094POC Details
46Collection of Detection, Fix, and exploit for CVE-2024-3094 https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploitsPOC Details
47This is a container environment running CVE-2024-3094 sshd backdoor instance, working with https://github.com/amlweems/xzbot project. IT IS NOT Docker, just implemented by chroot.https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-containerPOC Details
48Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoorhttps://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-CheckPOC Details
49The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094.https://github.com/TheTorjanCaptain/CVE-2024-3094-CheckerPOC Details
50The CVE-2024-3094 Checker is a Bash tool for identifying if Linux systems are at risk from the CVE-2024-3094 flaw in XZ/LZMA utilities. It checks XZ versions, SSHD's LZMA linkage, and scans for specific byte patterns, delivering results in a concise table format. https://github.com/iheb2b/CVE-2024-3094-CheckerPOC Details
51A tutorial on how to detect the CVE 2024-3094https://github.com/felipecosta09/cve-2024-3094POC Details
52Scans liblzma from xu-utils for backdoor (CVE-2024-3094)https://github.com/weltregie/liblzma-scanPOC Details
53Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor)https://github.com/crfearnworks/ansible-CVE-2024-3094POC Details
54A small repo with a single playbook.https://github.com/robertdebock/ansible-playbook-cve-2024-3094POC Details
55An Ansible Role that installs the xz backdoor (CVE-2024-3094) on a Debian host and optionally installs the xzbot tool.https://github.com/badsectorlabs/ludus_xz_backdoorPOC Details
56Scan for files containing the signature from the `xz` backdoor (CVE-2024-3094)https://github.com/Juul/xz-backdoor-scanPOC Details
57Nonehttps://github.com/drdry2/CVE-2024-3094-EXPLOITPOC Details
58La siguiente regla YARA ayuda a detectar la presencia del backdoor en la librería liblzma comprometida en sistemas que utilizan las versiones 5.6.0 y 5.6.1 de la herramienta de compresión XZ.https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-POC Details
59Nonehttps://github.com/AlexDoe11/CVE-2024-3094-EXPLOITPOC Details
60XZ Utils CVE-2024-3094 POC for Kuberneteshttps://github.com/neuralinhibitor/xzwhyPOC Details
61Basic POC to test CVE-2024-3094https://github.com/shefirot/CVE-2024-3094POC Details
62SSH EXPLOIT BYPASS AUTH SSHhttps://github.com/DANO-AMP/CVE-2024-3094POC Details
63GNU IFUNC is the real culprit behind CVE-2024-3094https://github.com/robertdfrench/ifuncd-upPOC Details
64Just a script to test if xz is vulnerable to the cve 2024-3094.https://github.com/yq93dskimzm2/CVE-2024-3094POC Details
65Presentazione per il corsi di sicurezza Informatica sulla vulnerabilità CVE-2024-3094https://github.com/AndreaCicca/Sicurezza-Informatica-PresentazionePOC Details
66CVE-2024-3094 (XZ Backdoor) Toolshttps://github.com/XiaomingX/cve-2024-3094-xz-backdoor-exploitPOC Details
67Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2024/CVE-2024-3094.yamlPOC Details
68CVE-2024-3094 실습 환경 구축 및 보고https://github.com/been22426/CVE-2024-3094POC Details
69Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbookhttps://github.com/gensecaihq/CVE-2024-3094-Vulnerability-Checker-FixerPOC Details
70Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor)https://github.com/KaminaDuck/ansible-CVE-2024-3094POC Details
71It was determined that malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. # It was determined that only certain operating systems and operating system versions were affected by this vulnerability.https://github.com/laxmikumari615/Linux---Security---Detect-and-Mitigate-CVE-2024-3094POC Details
72A XZ backdoor vulnerability explained in detailshttps://github.com/valeriot30/cve-2024-3094POC Details
73Threat intelligence report analyzing the xz-utils backdoor vulnerability (CVE-2024-3094)https://github.com/24Owais/threat-intel-cve-2024-3094POC Details
74CVE-2024-3094https://github.com/Dermot-lab/TryHackPOC Details
75Security analysis project: Real-world CVE breakdownhttps://github.com/Ikram124/CVE-2024-3094-analysisPOC Details
76Nonehttps://github.com/ykhurshudyan-blip/CVE-2024-3094POC Details
77CVE-2024-3094 exposed a backdoor in the XZ compression library, allowing remote SSH access by bypassing authentication. It’s a major supply chain attack affecting Linux systems, highlighting risks in trusted open-source components.https://github.com/mrk336/CVE-2024-3094POC Details
78Nonehttps://github.com/Titus-soc/-CVE-2024-3094-Vulnerability-Checker-Fixer-PublicPOC Details
79Obsidian notes about CVE-2024-3094https://github.com/zpxlz/CVE-2024-3094POC Details
80Investigation into the XZ Utils backdoor (CVE-2024-3094): chronology, attack chain, risk to SSH, and supply-chain insights. Includes slides, sources, and mitigations (parity checks, attestations, or SBOMs, as well as SLSA)https://github.com/M1lo25/CS50FinalProjectPOC Details
81Script to obfuscate a payload the same way as it was done by the XZ utils attack (CVE-2024-3094)https://github.com/ThomRgn/xzutils_backdoor_obfuscationPOC Details
82CVE-2024-3094https://github.com/B1ack4sh/Blackash-CVE-2024-3094POC Details
83CVE-2024-3094https://github.com/Ashwesker/Blackash-CVE-2024-3094POC Details
84Nonehttps://github.com/hariskhalil555000-sketch/What-utility-does-CVE-2024-3094-refer-to-POC Details
85This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the "xz" utility, as specified by CVE-2024-3094.https://github.com/HackerHermanos/CVE-2024-3094_xz_checkPOC Details
86Nonehttps://github.com/encikayelwhitehat-glitch/CVE-2024-3094POC Details
87Nonehttps://github.com/BOSE122/CVE-2024-3094POC Details
88Nonehttps://github.com/spidygal/CVE-2024-3094-Nmap-NSE-scriptPOC Details
89Python demo simulating CVE-2024-3094: a supply chain backdoor in XZ Utils with a trigger-based stealth activation.https://github.com/hackura/xz-cve-2024-3094POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-3094

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-3094

No comments yet


Leave a comment