POC详情: 72798ca853335aee0d5a10f4bb706cd423a1f332

来源
关联漏洞
标题: Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
描述:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
介绍
# CVE-2024-24919

## Description
CVE-2024-24919 is a critical information disclosure vulnerability affecting various Check Point security products, including Quantum Security Gateways and CloudGuard. It has a high CVSS score of 8.6 and allows unauthenticated attackers to read sensitive files from the affected devices, such as /etc/passwd, /etc/shadow, and configuration files related to network security and VPNs. This means attackers can potentially gain domain privileges and access sensitive information without user interaction or special privileges​


## How It Works
The script allows the user to input an IP address and a port, then sends POST requests to a specific endpoint (`/clients/MyCRL`) for various configuration files (such as `/etc/passwd`, `/etc/shadow`, among others). The script indicates whether the request was successful or failed, marking successful responses with an 'O' and failed ones with an 'X'.

## Installation

```bash
git clone https://https://github.com/skyrowalker/CVE-2024-24919.git
cd CVE-2024-24919
pip install -r requirements.txt
python3 CVE-2024-24919.py
```

## Images

![alt text](image-4.png)
![alt text](image-5.png)


文件快照

[4.0K] /data/pocs/72798ca853335aee0d5a10f4bb706cd423a1f332 ├── [4.0K] CVE-2024-24919.py ├── [ 67K] image-4.png ├── [116K] image-5.png ├── [1.2K] README.md └── [ 8] requirements.txt 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。