nomisec
WORKING POC
3,540 stars
by amlweems · poc
https://github.com/amlweems/xzbot
This repository provides a functional exploit for CVE-2024-3094, the xz backdoor, including a honeypot for detection, a patch to replace the ED448 key, and a demo tool to trigger RCE via SSH certificate manipulation.
Classification
Working Poc 100%
Target:
xz-utils (liblzma) 5.6.0-5.6.1
No auth needed
Prerequisites:
Vulnerable liblzma version · SSH access to target
nomisec
WORKING POC
146 stars
by lockness-Ko · poc
https://github.com/lockness-Ko/xz-vulnerable-honeypot
This repository provides a functional honeypot setup to detect exploitation attempts against CVE-2024-3094, the XZ backdoor in liblzma. It runs a vulnerable SSH daemon with monitoring tools (tcpdump, bpftrace, strace) to capture malicious activity.
Classification
Working Poc 90%
Target:
xz (liblzma) 5.6.1, OpenSSH
No auth needed
Prerequisites:
Docker · vulnerable xz/liblzma version · OpenSSH linked against vulnerable liblzma
nomisec
SCANNER
72 stars
by FabioBaroni · poc
https://github.com/FabioBaroni/CVE-2024-3094-checker
This repository contains a bash script that checks for vulnerable versions of xz-utils (5.6.0 and 5.6.1) and attempts to remediate by either updating via package manager or installing a safe version from source. It does not exploit the vulnerability but detects and mitigates it.
Classification
Scanner 95%
Target:
xz-utils 5.6.0, 5.6.1
No auth needed
Prerequisites:
Access to a Linux system with vulnerable xz-utils installed
nomisec
SCANNER
54 stars
by byinarie · poc
https://github.com/byinarie/CVE-2024-3094-info
This repository contains two bash scripts designed to detect the presence of the backdoored liblzma library (CVE-2024-3094) on a system. The scripts check for vulnerable xz versions and function signatures in liblzma, but do not include exploit code.
Classification
Scanner 95%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system's file system and binaries
nomisec
SCANNER
43 stars
by jfrog · poc
https://github.com/jfrog/cve-2024-3094-tools
This repository contains a detection tool for CVE-2024-3094 (XZ Backdoor), which checks for the presence of malicious XZ/LZMA versions and vulnerable SSH configurations. The tool performs static analysis to identify affected systems without executing malicious code.
Classification
Scanner 100%
Target:
XZ Utils (liblzma) versions 5.6.0-1, 5.6.1-1, 5.6.1-r0, 5.6.1-r1, and >=5.5.0
No auth needed
Prerequisites:
Access to the target system · Presence of 'strings', 'hexdump' or 'xxd', and 'awk' utilities
nomisec
SCANNER
26 stars
by gensecaihq · poc
https://github.com/gensecaihq/CVE-2024-3094-Vulnerability-Checker-Fixer
This repository contains a shell script designed to detect and mitigate the CVE-2024-3094 vulnerability in xz-utils by checking installed versions and upgrading/downgrading to a non-vulnerable version. It does not exploit the vulnerability but provides a remediation tool.
Classification
Scanner 90%
Target:
xz-utils versions 5.6.0 and 5.6.1
Auth required
Prerequisites:
Access to a Linux system with xz-utils installed · Sudo privileges for package management
nomisec
WRITEUP
19 stars
by robertdfrench · poc
https://github.com/robertdfrench/ifuncd-up
This repository provides a detailed technical analysis of CVE-2024-3094, focusing on the role of GNU IFUNC and the supply chain vulnerabilities in OpenSSH and SystemD. It includes code examples and performance comparisons to illustrate the impact of IFUNC.
Classification
Writeup 95%
Target:
OpenSSH, SystemD, xz-utils
No auth needed
Prerequisites:
Understanding of dynamic linking on Linux · Knowledge of GNU IFUNC
nomisec
WORKING POC
17 stars
by 0xlane · poc
https://github.com/0xlane/xz-cve-2024-3094
This script extracts and decodes malicious payloads embedded in the XZ Utils library (CVE-2024-3094), specifically targeting obfuscated object files and source code modifications. It demonstrates the backdoor mechanism by reconstructing compromised components like `liblzma_la-crc64-fast.o` and `liblzma_la-crc32-fast.o`.
Classification
Working Poc 90%
Target:
XZ Utils (xz) 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the compromised xz-5.6.1.tar.xz archive · Presence of malicious test files (e.g., bad-3-corrupt_lzma2.xz)
nomisec
WORKING POC
14 stars
by r0binak · poc
https://github.com/r0binak/xzk8s
This repository provides a Dockerized environment to reproduce CVE-2024-3094, a backdoor in xz utils. It includes a patched liblzma library and Kubernetes manifests to deploy a vulnerable pod for exploitation testing.
Classification
Working Poc 90%
Target:
xz utils (liblzma) 5.6.0
No auth needed
Prerequisites:
Docker · Kubernetes cluster · xzbot exploit tool
nomisec
SCANNER
11 stars
by teyhouse · poc
https://github.com/teyhouse/CVE-2024-3094
This repository provides detection scripts for CVE-2024-3094, a backdoor in xz utils (liblzma5 versions 5.6.0 and 5.6.1). The scripts check Docker containers, Kubernetes pods, and SBOMs for the presence of the vulnerable library by examining specific byte patterns.
Classification
Scanner 95%
Target:
xz utils (liblzma5) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to Docker or Kubernetes environment · Presence of vulnerable liblzma5 library
nomisec
WRITEUP
10 stars
by emirkmo · poc
https://github.com/emirkmo/xz-backdoor-github
This repository provides a technical analysis and visualization of GitHub activity related to the xz backdoor (CVE-2024-3094), focusing on contributions by suspicious users JiaT75 and Larhzu. It includes datasets and a Python script to plot GitHub events over time.
Classification
Writeup 90%
Target:
xz (5.6.0, 5.6.1)
No auth needed
Prerequisites:
Access to GitHub event datasets
nomisec
SCANNER
8 stars
by HackerHermanos · poc
https://github.com/HackerHermanos/CVE-2024-3094_xz_check
This repository contains a Bash script that checks if a system is running a vulnerable version of the xz utility (5.6.0 or 5.6.1) affected by CVE-2024-3094. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 100%
Target:
xz (versions 5.6.0 and 5.6.1)
No auth needed
Prerequisites:
xz utility installed on the target system
nomisec
WORKING POC
5 stars
by badsectorlabs · poc
https://github.com/badsectorlabs/ludus_xz_backdoor
This repository contains an Ansible role designed to deploy the xz backdoor (CVE-2024-3094) on Debian-based systems, including the installation of the backdoor library and the xzbot tool for command execution. It is intended for controlled environments like Ludus for security testing.
Classification
Working Poc 95%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Debian-based OS · Ansible installed · Root or sudo access
nomisec
SCANNER
5 stars
by wgetnz · poc
https://github.com/wgetnz/CVE-2024-3094-check
This repository contains a bash script that scans for the presence of vulnerable xz versions (5.6.0 or 5.6.1) and checks for specific function signatures in liblzma linked to sshd, which are indicators of CVE-2024-3094. It does not exploit the vulnerability but detects potential exposure.
Classification
Scanner 95%
Target:
xz-utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
sshd installed and linked to liblzma · xz-utils version 5.6.0 or 5.6.1
nomisec
WORKING POC
4 stars
by neuralinhibitor · poc
https://github.com/neuralinhibitor/xzwhy
This repository provides a Kubernetes-based Proof of Concept for CVE-2024-3094, which exploits a backdoor in XZ Utils via a malicious SSH connection. It deploys a vulnerable SSH endpoint and uses the 'xzbot' tool to trigger a bind shell, demonstrating remote code execution (RCE).
Classification
Working Poc 95%
Target:
XZ Utils (versions 5.6.0 and 5.6.1 with the backdoor)
No auth needed
Prerequisites:
Kubernetes cluster access · Docker for running the 'xzbot' tool · Network connectivity to the deployed SSH endpoint
nomisec
SCANNER
4 stars
by KaminaDuck · poc
https://github.com/KaminaDuck/ansible-CVE-2024-3094
This repository contains Ansible playbooks to detect and remediate CVE-2024-3094 (XZ backdoor). It includes scripts to check for vulnerable XZ versions and apply fixes, but does not include functional exploit code.
Classification
Scanner 95%
Target:
XZ utils 5.6.0 and 5.6.1
Auth required
Prerequisites:
Access to target systems with Ansible · Vulnerable XZ version installed
nomisec
SCANNER
4 stars
by Yuma-Tsushima07 · poc
https://github.com/Yuma-Tsushima07/CVE-2024-3094
This repository provides a Python script to detect vulnerable versions of the xz utility (CVE-2024-3094) and optionally install a stable version. It does not contain exploit code but scans for the presence of vulnerable versions.
Classification
Scanner 100%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Python 3.x · requests library · tarfile library · subprocess library
nomisec
SCANNER
4 stars
by lypd0 · poc
https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker
This repository contains a scanner to check if the installed version of XZ Utils is vulnerable to CVE-2024-3094. It verifies the version number against known vulnerable versions (5.6.0 and 5.6.1) and provides recommendations for mitigation.
Classification
Scanner 100%
Target:
XZ Utils 5.6.0, 5.6.1
No auth needed
Prerequisites:
XZ Utils installed on the system
nomisec
WRITEUP
3 stars
by przemoc · poc
https://github.com/przemoc/xz-backdoor-links
This repository is a curated collection of links and references related to the XZ backdoor (CVE-2024-3094), including details on the bad actor, discovery, root cause analysis, and advisories from various organizations. It does not contain exploit code but provides comprehensive technical and contextual information about the vulnerability.
Classification
Writeup 100%
Target:
XZ Utils 5.6.0, XZ Utils 5.6.1
No auth needed
Prerequisites:
Access to vulnerable versions of XZ Utils
nomisec
SCANNER
3 stars
by felipecosta09 · poc
https://github.com/felipecosta09/cve-2024-3094
This repository provides a scanner for detecting CVE-2024-3094 (XZ Backdoor) in container images using Trend Micro's Vision One TMAS CLI. It includes a Dockerfile for a vulnerable image and a bash script to automate the scanning process.
Classification
Scanner 90%
Target:
liblzma5 (versions prior to 5.6.1+really5.4.5-1)
Auth required
Prerequisites:
Vision One account · API key with 'Run artifact scan' permissions · Docker installed · jq installed
nomisec
SCANNER
3 stars
by gustavorobertux · poc
https://github.com/gustavorobertux/CVE-2024-3094
This repository contains a Go-based scanner that checks for the presence of the CVE-2024-3094 vulnerability by examining the function signature in liblzma and verifying the xz version. It does not exploit the vulnerability but detects potential exposure.
Classification
Scanner 95%
Target:
xz (liblzma) versions affected by CVE-2024-3094
No auth needed
Prerequisites:
Access to the target system to run the scanner · Presence of sshd or xz binaries
nomisec
SCANNER
3 stars
by pentestfunctions · poc
https://github.com/pentestfunctions/CVE-2024-3094
This repository contains a bash script that checks for the presence of the malicious XZ backdoor (CVE-2024-3094) by verifying XZ version, SSH daemon linkage with LZMA, and specific byte patterns in the LZMA library. It does not exploit the vulnerability but detects potential compromise.
Classification
Scanner 100%
Target:
XZ Utils (5.6.0-1, 5.6.1-1, 5.6.1-r0, 5.6.1-r1) and linked SSH daemon
No auth needed
Prerequisites:
Access to the target system's shell · Presence of XZ Utils or SSH daemon
github
SCANNER
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-3094
The repository contains a scanner for CVE-2024-21762, a Fortinet SSL VPN vulnerability, which checks for the presence of the vulnerability by sending crafted HTTP requests. It does not include exploit code but provides detection capabilities.
Classification
Scanner 90%
Target:
Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target Fortinet SSL VPN interface
nomisec
SCANNER
2 stars
by Security-Phoenix-demo · poc
https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits
The repository contains detection scripts for CVE-2024-3094, which check for vulnerable versions of liblzma and xz. It does not include exploit code but provides tools to identify affected systems.
Classification
Scanner 95%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system to run the scripts
nomisec
WRITEUP
2 stars
by mrk336 · poc
https://github.com/mrk336/CVE-2024-3094
This repository provides a detailed technical analysis of CVE-2024-3094, including a patch diff, attack flow, and defensive measures like YARA rules. It does not contain functional exploit code but offers in-depth research on the XZ backdoor mechanism.
Classification
Writeup 95%
Target:
XZ compression library (versions affected by CVE-2024-3094)
No auth needed
Prerequisites:
Access to a vulnerable XZ library version · Ability to modify and recompile the XZ library on the target system
nomisec
WORKING POC
2 stars
by DANO-AMP · poc
https://github.com/DANO-AMP/CVE-2024-3094
This repository contains a functional exploit for CVE-2024-3094 (regreSSHion), targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems. The exploit leverages a race condition in the SIGALRM handler to achieve remote code execution as root.
Classification
Working Poc 95%
Target:
OpenSSH 9.2p1
No auth needed
Prerequisites:
Target system running vulnerable OpenSSH version · Network access to the target SSH port
nomisec
SCANNER
2 stars
by Bella-Bc · poc
https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check
This repository contains a bash script to detect if the installed version of xz-utils (liblzma5) is vulnerable to CVE-2024-3094. It checks the version number and prompts the user to update if a vulnerable version is found.
Classification
Scanner 90%
Target:
xz-utils (liblzma5) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to a Debian-based system with apt package manager
nomisec
SCANNER
2 stars
by ScrimForever · poc
https://github.com/ScrimForever/CVE-2024-3094
This repository contains a Python script that scans for the presence of CVE-2024-3094 by checking the version of xz and the signature of liblzma. It does not exploit the vulnerability but detects vulnerable versions.
Classification
Scanner 95%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system to run the script
nomisec
SCANNER
2 stars
by Horizon-Software-Development · poc
https://github.com/Horizon-Software-Development/CVE-2024-3094
The repository contains a bash script that scans for the presence of vulnerable versions of the xz library (5.6.0 or 5.6.1) and checks for a specific function signature in liblzma associated with CVE-2024-3094. It does not include exploit code but provides detection capabilities.
Classification
Scanner 90%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system to run the script
nomisec
WRITEUP
1 stars
by M1lo25 · poc
https://github.com/M1lo25/CS50FinalProject
This repository contains a case study and presentation materials on the XZ Utils backdoor (CVE-2024-3094), focusing on the supply-chain attack mechanism, detection, and mitigation strategies. It includes references to official disclosures and technical analyses but does not contain exploit code.
Classification
Writeup 100%
Target:
XZ Utils (liblzma) in SSH authentication chain
No auth needed
Prerequisites:
N/A
nomisec
WRITEUP
1 stars
by Ikram124 · poc
https://github.com/Ikram124/CVE-2024-3094-analysis
This repository provides a detailed technical analysis of CVE-2024-3094, a backdoor vulnerability in the xz compression library (versions 5.6.0 and 5.6.1) that allows unauthorized remote code execution via SSH. It includes mitigation steps, detection methods, and lessons learned from the incident.
Classification
Writeup 100%
Target:
xz-utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Vulnerable version of xz-utils installed on the target system · SSH service running on the target system
nomisec
WRITEUP
1 stars
by 24Owais · poc
https://github.com/24Owais/threat-intel-cve-2024-3094
This repository contains a detailed threat intelligence report on CVE-2024-3094, a supply chain backdoor in xz-utils versions 5.6.0 and 5.6.1. It includes technical details, indicators of compromise, mitigation steps, and references to official sources.
Classification
Writeup 100%
Target:
xz-utils 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Affected versions of xz-utils installed · OpenSSH with libsystemd support
nomisec
WORKING POC
1 stars
by valeriot30 · poc
https://github.com/valeriot30/cve-2024-3094
This repository contains a functional exploit PoC for CVE-2024-3094, the XZ backdoor in liblzma. It includes a Docker environment for testing, a Go-based tool to trigger the backdoor via SSH authentication, and scripts to patch and inject the malicious library.
Classification
Working Poc 95%
Target:
xz-utils (liblzma) versions 5.6.0 and 5.6.1
Auth required
Prerequisites:
Access to a vulnerable system with the malicious liblzma library · SSH access to the target system
github
WRITEUP
1 stars
by AsimCr · pythonpoc
https://github.com/AsimCr/POC_Collecter_Bot/tree/master/CVE_Looter/2025/05/07/CVE-2024-3094
This repository contains a detailed writeup and Docker-based lab setup for CVE-2024-3094, the XZ Utils backdoor vulnerability. It includes a Dockerfile and docker-compose.yaml to replicate the vulnerable environment, along with steps to verify the presence of the backdoored liblzma library.
Classification
Writeup 90%
Target:
XZ Utils 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Docker · vulnerable liblzma5 package
nomisec
SCANNER
1 stars
by robertdebock · poc
https://github.com/robertdebock/ansible-playbook-cve-2024-3094
This Ansible playbook checks for vulnerability to CVE-2024-3094 by leveraging an external role. It does not contain exploit code but scans for the presence of the vulnerability.
Classification
Scanner 90%
Target:
Unknown (role-specific)
Auth required
Prerequisites:
Ansible installed · Target system accessible · Appropriate permissions
nomisec
SCANNER
1 stars
by brinhosa · poc
https://github.com/brinhosa/CVE-2024-3094-One-Liner
This repository provides one-liner scripts to check for the presence of vulnerable versions of the `xz` utility (5.6.0 or 5.6.1) affected by CVE-2024-3094. It includes commands for checking installed packages, Docker images using Trivy, and code repositories for references to the `xz` library.
Classification
Scanner 100%
Target:
xz utility (versions 5.6.0 and 5.6.1)
No auth needed
Prerequisites:
Access to the target system or Docker environment · Basic command-line tools (dpkg, rpm, xz, docker, jq)
nomisec
SCANNER
1 stars
by galacticquest · poc
https://github.com/galacticquest/cve-2024-3094-detect
This repository contains a Bash script that detects vulnerable versions of XZ Utils (5.6.0 or 5.6.1) and downgrades them to a safe version (5.4.3) on supported Linux distributions. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 95%
Target:
XZ Utils 5.6.0, 5.6.1
Auth required
Prerequisites:
Bash shell · Superuser privileges
nomisec
SCANNER
1 stars
by harekrishnarai · poc
https://github.com/harekrishnarai/xz-utils-vuln-checker
This repository contains a bash script that scans for the presence of vulnerable xz-utils versions (5.6.0 or 5.6.1) and checks for the specific backdoor signature in the liblzma library linked to sshd. It does not exploit the vulnerability but detects it.
Classification
Scanner 95%
Target:
xz-utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
bash shell · xz-utils installed · sshd installed
nomisec
SCANNER
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2024-3094
This repository contains a bash script that scans for the presence of the backdoor in XZ Utils (CVE-2024-3094) by checking version numbers and binary patterns. It does not exploit the vulnerability but detects compromised systems.
Classification
Scanner 95%
Target:
XZ Utils (versions 5.6.0-1, 5.6.1-1, 5.6.1-r0, 5.6.1-r1)
No auth needed
Prerequisites:
system with vulnerable XZ Utils installed · sshd binary linked to liblzma
nomisec
WORKING POC
by Ava-Vispilio · poc
https://github.com/Ava-Vispilio/CVE-2024-3094
This repository provides a functional exploit for CVE-2024-3094, which involves a backdoor in the xz compression library affecting OpenSSH. The PoC includes scripts to build a vulnerable OpenSSH environment, patch the malicious liblzma library, and execute arbitrary commands via the backdoor.
Classification
Working Poc 95%
Target:
OpenSSH (via xz library backdoor)
No auth needed
Prerequisites:
Vulnerable xz library (liblzma.so.5.6.1) · OpenSSH linked against the vulnerable library · Network access to the target SSH server
nomisec
WRITEUP
by h3raklez · poc
https://github.com/h3raklez/CVE-2024-3094
This repository provides a detailed technical analysis of CVE-2024-3094, the XZ Utils backdoor, including its mechanism, exploitation requirements, and lab environment setup. It does not contain functional exploit code but offers in-depth research and references.
Classification
Writeup 100%
Target:
XZ Utils (liblzma) 5.6.0 and 5.6.1
No auth needed
Prerequisites:
glibc with IFUNC support · XZ Utils 5.6.0 or 5.6.1 · sshd launched from systemd · x86-64 system
nomisec
WORKING POC
by vnchk1 · poc
https://github.com/vnchk1/sec_review_cve-2024-3094
This repository contains a functional exploit PoC for CVE-2024-3094, demonstrating remote code execution via a backdoor in the XZ Utils library. It includes a Dockerized environment with a vulnerable version of XZ Utils and a test suite to verify exploitation.
Classification
Working Poc 90%
Target:
XZ Utils 5.6.0
No auth needed
Prerequisites:
Vulnerable XZ Utils library installed · SSH service running
nomisec
STUB
by ElinaNotElina · poc
https://github.com/ElinaNotElina/cve-2024-3094-analysis
The repository contains only a README.md file with no actual exploit code or technical analysis. It appears to be a placeholder or incomplete repository.
Target:
unknown
No auth needed
nomisec
WORKING POC
by extracoding-dozen · poc
https://github.com/extracoding-dozen/CVE-2024-3094
This repository contains a functional PoC for CVE-2024-3094, a backdoor in xz-utils affecting OpenSSH. It includes a Dockerized test environment, automated tests for detecting timing anomalies, and a PoC script to emulate the vulnerability.
Classification
Working Poc 95%
Target:
xz-utils (liblzma) affecting OpenSSH
No auth needed
Prerequisites:
vulnerable version of xz-utils (5.6.0 or 5.6.1) · OpenSSH server using the affected library
nomisec
STUB
by michalAshurov · poc
https://github.com/michalAshurov/writeup-CVE-2024-3094
The repository contains only a README.md file with a title and no technical details or exploit code. It appears to be a placeholder or incomplete writeup for CVE-2024-3094.
Target:
unknown
No auth needed
nomisec
WRITEUP
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2024-3094
This repository provides a comprehensive technical analysis of CVE-2024-3094, detailing the supply-chain attack on XZ Utils, its obfuscation techniques, activation conditions, and remediation steps. It includes a deep dive into the backdoor's mechanics and the social engineering campaign behind it.
Classification
Writeup 100%
Target:
XZ Utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
x86-64 Linux with glibc + systemd · OpenSSH linked to liblzma · Built from malicious tarballs
gitlab
SCANNER
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2024-3094-info
This repository contains scripts to detect the presence of the backdoor in liblzma (CVE-2024-3094) by checking for specific function signatures and xz versions. It does not include exploit code but provides detection capabilities.
Classification
Scanner 100%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
access to the target system · presence of vulnerable xz/liblzma versions
nomisec
WRITEUP
by hackura · poc
https://github.com/hackura/xz-cve-2024-3094
This repository provides a detailed technical analysis of CVE-2024-3094, focusing on the root cause, attack chain, and defensive strategies from a blue team perspective. It includes a conceptual demonstration of how malicious shared libraries can execute code when loaded by trusted programs.
Classification
Writeup 95%
Target:
XZ Utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Malicious code introduced through the build system · Specific build conditions to activate the backdoor
nomisec
STUB
by encikayelwhitehat-glitch · poc
https://github.com/encikayelwhitehat-glitch/CVE-2024-3094
The repository contains only a README.md file with the CVE identifier and no additional technical details or exploit code. It lacks any meaningful content to classify it as a working PoC, scanner, or writeup.
Target:
unknown
No auth needed
nomisec
WORKING POC
by ThomRgn · poc
https://github.com/ThomRgn/xzutils_backdoor_obfuscation
This repository provides a functional script to recreate the obfuscation technique used in the XZ Utils backdoor (CVE-2024-3094). It demonstrates how to inject a malicious payload into the 'good-large_compressed.lzma' file, which is then extracted during the compilation process of xzutils v5.6.0.
Classification
Working Poc 95%
Target:
xzutils v5.6.0
No auth needed
Prerequisites:
Original 'good-large_compressed.lzma' from xzutils 5.6.0 · xzutils 5.6.0 source code
nomisec
SCANNER
by Titus-soc · poc
https://github.com/Titus-soc/-CVE-2024-3094-Vulnerability-Checker-Fixer-Public
This repository contains a shell script designed to detect and mitigate CVE-2024-3094, a backdoor in xz-utils versions 5.6.0 and 5.6.1. The script checks for vulnerable versions and attempts to upgrade or install a safe version (5.4.6) if necessary.
Classification
Scanner 90%
Target:
xz-utils 5.6.0, 5.6.1
Auth required
Prerequisites:
Access to a vulnerable system with xz-utils installed · Privileges to install/update packages
nomisec
WRITEUP
by been22426 · poc
https://github.com/been22426/CVE-2024-3094
This repository provides a detailed technical analysis and Docker-based lab setup for CVE-2024-3094, the XZ Utils backdoor. It includes steps to verify the vulnerable liblzma5 version and a PoC script to detect the backdoor, though it does not include functional exploit code.
Classification
Writeup 90%
Target:
XZ Utils 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Docker environment · Vulnerable liblzma5 version installed
nomisec
WORKING POC
by shefirot · poc
https://github.com/shefirot/CVE-2024-3094
This repository provides a functional PoC for CVE-2024-3094, demonstrating command execution in a Kubernetes pod via a malicious liblzma library. It includes deployment configurations and scripts to exploit the vulnerability, including shutting down nodes.
Classification
Working Poc 95%
Target:
Kubernetes clusters with vulnerable liblzma (xz-utils)
No auth needed
Prerequisites:
Kubernetes cluster access · kubectl installed · Go installed · xzbot tool
nomisec
WRITEUP
by AndreaCicca · poc
https://github.com/AndreaCicca/Sicurezza-Informatica-Presentazione
This repository contains a detailed technical analysis of CVE-2024-3094, the XZ Utils backdoor, including its discovery, impact, and the social engineering tactics used to introduce it. It provides a comprehensive overview of the vulnerability's mechanics and broader implications for supply chain security.
Classification
Writeup 100%
Target:
XZ Utils (versions 5.6.0 and 5.6.1), OpenSSH, Systemd
No auth needed
Prerequisites:
Linux x86/64 system · Compromised versions of XZ Utils (5.6.0 or 5.6.1) · Exposed SSH service · Systemd-linked SSHD · SSHD running as a systemd service
nomisec
WRITEUP
by zpxlz · poc
https://github.com/zpxlz/CVE-2024-3094
This repository contains detailed technical analysis and documentation about CVE-2024-3094, the xz supply chain attack, including multiple markdown files discussing the backdoor, its discovery, and related tools. No functional exploit code is present.
Classification
Writeup 90%
Target:
xz utils (5.6.0, 5.6.1)
No auth needed
Prerequisites:
Compromised build environment · Access to upstream distribution channels
nomisec
SCANNER
by fevar54 · poc
https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-
This repository provides a YARA rule to detect the backdoor in liblzma from XZ Utils versions 5.6.0 and 5.6.1. It is a detection tool rather than an exploit, designed to identify compromised systems.
Classification
Scanner 90%
Target:
XZ Utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the system to run the YARA rule
nomisec
SCANNER
by Juul · poc
https://github.com/Juul/xz-backdoor-scan
This repository contains a scanner tool designed to detect the presence of the backdoor signature associated with CVE-2024-3094 in files. It uses memory-mapped file scanning and a Boyer-Moore-like algorithm to search for the specific binary signature of the xz backdoor.
Classification
Scanner 100%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the filesystem containing potentially compromised files
nomisec
SCANNER
by iheb2b · poc
https://github.com/iheb2b/CVE-2024-3094-Checker
This repository contains a Bash script that scans for the presence of CVE-2024-3094 by checking XZ/LZMA versions and detecting malicious byte patterns in linked libraries. It does not exploit the vulnerability but provides a detailed assessment of system exposure.
Classification
Scanner 95%
Target:
XZ/LZMA utilities (versions 5.6.0 and 5.6.1)
No auth needed
Prerequisites:
Access to the target system · Presence of XZ/LZMA utilities · SSHD binary for linked library checks
nomisec
SCANNER
by weltregie · poc
https://github.com/weltregie/liblzma-scan
This script scans for files matching 'liblzma*' and checks their SHA256 hashes against a list of known malicious hashes to detect potential backdoors related to CVE-2024-3094. It does not exploit the vulnerability but identifies compromised files.
Classification
Scanner 95%
Target:
liblzma (xz utils)
No auth needed
Prerequisites:
access to the filesystem · hashes.txt file with known malicious hashes
nomisec
SCANNER
by TheTorjanCaptain · poc
https://github.com/TheTorjanCaptain/CVE-2024-3094-Checker
This repository contains a bash script that checks if the installed xz-utils package is vulnerable to CVE-2024-3094 by comparing version numbers. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 95%
Target:
xz-utils (versions 5.6.0 and 5.6.1)
No auth needed
Prerequisites:
xz-utils installed on the target system
nomisec
WORKING POC
by MagpieRYL · poc
https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container
This repository provides a functional environment to test the CVE-2024-3094 SSH backdoor exploit using a chroot-based container with systemd integration. It includes a pre-patched liblzma.so and a static binary of the xzbot exploit tool for testing.
Classification
Working Poc 90%
Target:
SSH (sshd) with backdoored liblzma (xz utils)
No auth needed
Prerequisites:
Access to a vulnerable system with systemd · Replaced liblzma.so with backdoored version
nomisec
SCANNER
by devjanger · poc
https://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-Detector
This repository contains a bash script that detects whether the installed version of XZ Utils is vulnerable to CVE-2024-3094. It checks the version number against known affected versions (5.6.0 and 5.6.1) and reports vulnerability status.
Classification
Scanner 100%
Target:
XZ Utils versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
XZ Utils installed on the target system
nomisec
SCANNER
by hackingetico21 · poc
https://github.com/hackingetico21/revisaxzutils
This repository contains a bash script that checks for the presence of vulnerable versions of XZ Utils (5.6.0 or 5.6.1) affected by CVE-2024-3094. It does not exploit the vulnerability but scans for it by checking the installed version.
Classification
Scanner 100%
Target:
XZ Utils 5.6.0, 5.6.1
No auth needed
Prerequisites:
Access to the target system to run the script
nomisec
SCANNER
by ackemed · poc
https://github.com/ackemed/detectar_cve-2024-3094
This repository contains a Python script that detects the presence of the malicious XZ backdoor (CVE-2024-3094) by checking XZ version, SSH daemon linkage with LZMA, and specific byte patterns in the LZMA library. It does not exploit the vulnerability but scans for indicators of compromise.
Classification
Scanner 95%
Target:
XZ Utils (5.5.0 and later), specifically malicious versions 5.6.1-r0 and 5.6.1-r1 on Alpine Linux
No auth needed
Prerequisites:
Access to the target system · Presence of XZ Utils or SSH daemon
nomisec
STUB
by dah4k · poc
https://github.com/dah4k/CVE-2024-3094
The repository contains only a GitHub Actions workflow for Docker and a Makefile, with no actual exploit code or technical details about CVE-2024-3094. It appears to be a placeholder or incomplete project.
Target:
unknown
No auth needed
nomisec
SCANNER
by mesutgungor · poc
https://github.com/mesutgungor/xz-backdoor-vulnerability
This script queries the Wazuh API to detect systems with the vulnerable 'liblzma5' package, which is associated with the XZ backdoor (CVE-2024-3094). It authenticates with the Wazuh API, searches for affected packages, and exports results to a CSV file.
Classification
Scanner 90%
Target:
Wazuh (with liblzma5 package)
Auth required
Prerequisites:
Wazuh API access · Valid credentials · Environment variables for API user/password
nomisec
SCANNER
by mightysai1997 · poc
https://github.com/mightysai1997/CVE-2024-3094
This repository provides detection scripts for CVE-2024-3094, a backdoor in xz utils (liblzma). It includes scripts to scan Docker containers, Kubernetes pods, and SBOMs for vulnerable versions of liblzma5 (5.6.0 or 5.6.1).
Classification
Scanner 95%
Target:
xz utils (liblzma5) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to Docker or Kubernetes environment · Presence of vulnerable liblzma5 versions
nomisec
SCANNER
by mightysai1997 · poc
https://github.com/mightysai1997/CVE-2024-3094-info
This repository contains two bash scripts designed to detect the presence of the backdoored liblzma library (CVE-2024-3094) on a system. The scripts check for vulnerable xz versions and scan binaries/libraries for dependencies on the malicious liblzma.
Classification
Scanner 95%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system's file system · Presence of vulnerable xz/liblzma versions
nomisec
SCANNER
by Mustafa1986 · poc
https://github.com/Mustafa1986/CVE-2024-3094
This repository contains a Python script that checks for vulnerable versions of xz-utils (CVE-2024-3094) and offers to install a stable version. It does not exploit the vulnerability but scans for it.
Classification
Scanner 90%
Target:
xz-utils
No auth needed
Prerequisites:
Python 3 · requests library · internet access
nomisec
SCANNER
by MrBUGLF · poc
https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094
The repository contains a detection script for CVE-2024-3094, a supply chain attack in XZ Utils (liblzma). The script checks for the presence of a malicious backdoor in the `sshd` binary by verifying a specific function signature in the linked `liblzma` library.
Classification
Scanner 95%
Target:
XZ Utils (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system to run the detection script
nomisec
SCANNER
by Simplifi-ED · poc
https://github.com/Simplifi-ED/CVE-2024-3094-patcher
This repository contains an Ansible playbook designed to detect and patch systems vulnerable to CVE-2024-3094, a backdoor in xz-utils versions 5.6.0 and 5.6.1. It checks installed package versions and downgrades to a safe version (5.4.6) if vulnerable versions are found.
Classification
Scanner 95%
Target:
xz-utils 5.6.0, 5.6.1
No auth needed
Prerequisites:
Access to execute Ansible playbooks on target systems · Target systems must have xz-utils installed
nomisec
SUSPICIOUS
by isuruwa · poc
https://github.com/isuruwa/CVE-2024-3094
The repository lacks actual exploit code and instead redirects to external links for details, which is characteristic of suspicious repositories. No technical details or functional PoC are provided.
Classification
Suspicious 90%
Target:
xz 5.6.0 or 5.6.1
No auth needed
nomisec
SCANNER
by hazemkya · poc
https://github.com/hazemkya/CVE-2024-3094-checker
This repository contains a Bash script that detects and optionally remediates CVE-2024-3094, a supply chain compromise in xz-utils. It checks for vulnerable versions and can downgrade to a safe version, but does not exploit the vulnerability.
Classification
Scanner 100%
Target:
xz-utils 5.6.0, 5.6.1
No auth needed
Prerequisites:
xz-utils installed on the system
nomisec
SCANNER
by ashwani95 · poc
https://github.com/ashwani95/CVE-2024-3094
This repository contains a detection script for CVE-2024-3094, which checks if the liblzma library used by sshd is vulnerable by verifying the presence of a specific byte signature. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 100%
Target:
liblzma (xz utils) versions affected by CVE-2024-3094
No auth needed
Prerequisites:
sshd installed on the system · liblzma library present in sshd dependencies
nomisec
SCANNER
by Fractal-Tess · poc
https://github.com/Fractal-Tess/CVE-2024-3094
This repository contains a Bash script that checks for vulnerable versions of xz-utils (5.6.0 or 5.6.1) and offers to replace them with a stable version (5.4.6). It does not exploit the vulnerability but provides a detection and remediation tool.
Classification
Scanner 90%
Target:
xz-utils 5.6.0, 5.6.1
No auth needed
Prerequisites:
xz-utils installed · wget · tar · make · sudo access
nomisec
SCANNER
by bioless · poc
https://github.com/bioless/xz_cve-2024-3094_detection
This repository contains a Bash script to detect the presence of CVE-2024-3094, a backdoor in the xz compression library. The script checks for the vulnerable function signature in liblzma and verifies the xz version.
Classification
Scanner 100%
Target:
xz (liblzma) versions 5.6.0 and 5.6.1
No auth needed
Prerequisites:
Access to the target system to run the script
nomisec
SCANNER
by OpensourceICTSolutions · poc
https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094
This repository contains a Zabbix template for detecting potentially vulnerable versions of liblzma5 (xz-utils) affected by CVE-2024-3094. It uses a Zabbix item to check the installed version and triggers an alert if a vulnerable version is detected.
Classification
Scanner 90%
Target:
xz-utils (liblzma5) versions 5.1.x, 5.2.x, and 5.4.x
Auth required
Prerequisites:
Zabbix monitoring system · Access to target system's package information