Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3094 PoC — Xz: malicious code in distributed source

Source
Associated Vulnerability
Title:Xz: malicious code in distributed source (CVE-2024-3094)
Description:Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
Description
Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)
Readme
# CVE-2024-3094 checker

xz Utils versions 5.6.0 and 5.6.1 appear to be compromised.

XZ Utils is data compression software and may be present in Linux distributions.
The malicious code may allow unauthorized access to affected systems. 

## Sources:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3094

https://access.redhat.com/security/cve/CVE-2024-3094

https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users

https://www.openwall.com/lists/oss-security/2024/03/29/4

CISA recommends developers and users to downgrade XZ Utils to an uncompromised version such as XZ Utils 5.4.6 Stable.

You can use this script to quickly check whether your Linux system contains a vulnerable version of XZ Utils, uninstall it and eventually attempt installing a safe version automatically.

## Usage:
```bash
wget https://raw.githubusercontent.com/FabioBaroni/CVE-2024-3094-checker/main/CVE-2024-3094-checker.sh
chmod +x CVE-2024-3094-checker.sh
./CVE-2024-3094-checker.sh
```

### Disclaimer:

This shell script is provided as-is and without warranty of any kind, express or implied.
By executing this script, you acknowledge that you do so at your own risk.
The author(s) of this script shall not be liable for any damages or issues that may arise from its use, including but not limited to data loss, system instability, or any other unintended consequences. 
It is recommended to review the script and understand its functionality before running it, and to ensure that appropriate backups are in place.
Use of this script implies your acceptance of these terms.
File Snapshot

[4.0K] /data/pocs/d4de69a8c21534638d6881d347493da76514ad12 ├── [3.3K] CVE-2024-3094-checker.sh └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →