Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3094 PoC — Xz: malicious code in distributed source

Source
Associated Vulnerability
Title:Xz: malicious code in distributed source (CVE-2024-3094)
Description:Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Description
Verify that your XZ Utils version is not vulnerable to CVE-2024-3094
Readme
# CVE-2024-3094-Vulnerabity-Checker
Verify that your XZ Utils version is not vulnerable to CVE-2024-3094

```
┌──(lypd0㉿kali)-[~]
└─$ ./CVE-2024-3094_checker.sh
  ___  _  _  ____     ___   ___  ___   __       ___   ___   ___   __  
 / __)( \/ )( ___)___(__ \ / _ \(__ \ /. |  ___(__ ) / _ \ / _ \ /. |    
( (__  \  /  )__)(___)/ _/( (_) )/ _/(_  _)(___)(_ \( (_) )\_  /(_  _)
 \___)  \/  (____)   (____)\___/(____) (_)     (___/ \___/  (_/   (_)

 [*] You are NOT vulnerable to CVE-2024-3094.
```

## Background

CISA (Cybersecurity and Infrastructure Security Agency) and the open-source community have responded to reports of malicious code being embedded in XZ Utils versions 5.6.0 and 5.6.1. This activity has been assigned CVE-2024-3094.

XZ Utils is data compression software commonly present in Linux distributions. The presence of malicious code in these versions may allow unauthorized access to affected systems.

## Recommendation

CISA recommends developers and users to take the following actions if their systems are found to be vulnerable:

- **Downgrade XZ Utils**: If you are using version 5.6.0 or 5.6.1, downgrade to an uncompromised version, such as XZ Utils 5.4.6 Stable.

- **Hunt for Malicious Activity**: After downgrading, thoroughly search for any signs of malicious activity within your systems.

- **Report Findings**: If you detect any malicious activity or suspicious behavior, report your findings to CISA for further investigation.
File Snapshot

[4.0K] /data/pocs/48bff0a000edda8f90fedd58ac1732acfd6271aa ├── [1.2K] CVE-2024-3094_checker.py ├── [ 983] CVE-2024-3094_checker.sh ├── [1.0K] LICENSE └── [1.4K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →