Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3094 PoC — Xz: malicious code in distributed source

Source
Associated Vulnerability
Title:Xz: malicious code in distributed source (CVE-2024-3094)
Description:Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Readme
Good evening,

I would like to inform you about a critical security issue that has been identified and directly affects the Linux community, including servers and Android devices. It was discovered that one of the contributors, known by the name of Jesse, has been distributing corrupted binaries. This individual gained unauthorized control over the tar.xz forum and the associated library, raising significant concerns about the integrity of binaries distributed through these channels.

Currently, all affected binaries are being rigorously reanalyzed in search of potential backdoors. The most critical vulnerability was found in the Linux SSH library, posing an imminent risk to the security of operating systems and devices that rely on this library for secure network operations.

In light of this alarming discovery, it is imperative that all users take immediate measures to mitigate the associated risks. We strongly recommend updating all Linux operating systems and Android devices to the latest versions, which contain fixes for these specific vulnerabilities. It is also crucial to review and update the security settings related to the SSH library to ensure protection against unauthorized access.

Mitigation instructions:

    Immediately update all systems and devices to the latest software versions in use.
    Review the security settings of your SSH infrastructure to ensure they are configured according to best security practices.
    Consider implementing additional security measures, such as firewalls and intrusion detection systems, to reinforce protection against future attacks.

CVE-2024-3094
https://nvd.nist.gov/vuln/detail/CVE-2024-3094 for more info!
File Snapshot

[4.0K] /data/pocs/5e1a1cc62531453e63ee501705bd58e35849f943 ├── [1.6K] README.md └── [1008] xz_check.sh 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →