Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3094 PoC — Xz: malicious code in distributed source

Source
Associated Vulnerability
Title:Xz: malicious code in distributed source (CVE-2024-3094)
Description:Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Readme
# CVE-2024-3094

## XZ-Utils Vulnerability Checker and Fixer

This Bash script checks for vulnerable versions of xz-utils installed on your system and offers to replace them with a stable, uncompromised version.

### Requirements

- `wget`
- `tar`
- `make`
- `sudo`

### Usage

1. Ensure you have the required dependencies installed.
2. Run the script with the following command:

```bash
wget -O - https://raw.githubusercontent.com/Fractal-Tess/CVE-2024-3094/main/CVE-2024-3094-checker.sh | sudo bash
```

or

```bash
curl -L https://raw.githubusercontent.com/Fractal-Tess/CVE-2024-3094/main/CVE-2024-3094-checker.sh | sudo bash
```

or

```bash
git clone https://github.com/Fractal-Tess/CVE-2024-3094
cd CVE-2024-3094
chmod +x CVE-2024-3094-checker.sh
sudo ./CVE-2024-3094-checker.sh
```

### Description

The script performs the following steps:

1. Checks if xz-utils is installed.
2. Checks the version of xz-utils.
3. If the version is vulnerable (5.6.0 or 5.6.1), it prompts the user to install the stable version (5.4.6) from source.
4. Downloads the stable version from the official GitHub repository.
5. Verifies the integrity of the downloaded file via a sha256sum checksum.
6. Configures, compiles, and installs the stable version.
7. Notifies the user about the successful installation and prompts them to uninstall the vulnerable version using their package manager.

### Note

- It's recommended to uninstall the vulnerable version manually after installing the stable version to ensure system integrity.

### Disclaimer

This script is provided as-is and without warranty. Use at your own risk.
File Snapshot

[4.0K] /data/pocs/514e305d7896a0afee8e66ce6fb86eca3553f6e7 ├── [1.7K] CVE-2024-3094-checker.sh └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →