# 信息泄露
# 漏洞描述
## 概述
攻击者可能通过该漏洞读取某些信息,前提是攻击者已连接到互联网,并且启用了远程访问VPN或移动访问软件刀片的Check Point安全网关。
## 影响版本
未提供具体影响版本信息。
## 细节
该漏洞允许攻击者读取Check Point安全网关上的某些信息,前提是安全网关已连接到互联网,并且启用了远程访问VPN或移动访问软件刀片。
## 影响
攻击者可能利用此漏洞读取敏感信息,导致数据泄露。目前已有安全修复补丁可用。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN. | https://github.com/c3rrberu5/CVE-2024-24919 | POC详情 |
| 2 | POC exploit for CVE-2024-24919 information leakage | https://github.com/emanueldosreis/CVE-2024-24919 | POC详情 |
| 3 | None | https://github.com/hendprw/CVE-2024-24919 | POC详情 |
| 4 | CVE-2024-24919 Exploit PoC | https://github.com/LucasKatashi/CVE-2024-24919 | POC详情 |
| 5 | None | https://github.com/eoslvs/CVE-2024-24919 | POC详情 |
| 6 | Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT | https://github.com/Bytenull00/CVE-2024-24919 | POC详情 |
| 7 | None | https://github.com/am-eid/CVE-2024-24919 | POC详情 |
| 8 | None | https://github.com/pewc0/CVE-2024-24919 | POC详情 |
| 9 | Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point) | https://github.com/zam89/CVE-2024-24919 | POC详情 |
| 10 | A simple bash and python script to check for the vulnerability CVE-2024-24919 | https://github.com/satriarizka/CVE-2024-24919 | POC详情 |
| 11 | CLI based PoC for CVE-2024-24919 | https://github.com/3UR/CVE-2024-24919 | POC详情 |
| 12 | An Vulnerability detection and Exploitation tool for CVE-2024-24919 | https://github.com/RevoltSecurities/CVE-2024-24919 | POC详情 |
| 13 | None | https://github.com/Vulnpire/CVE-2024-24919 | POC详情 |
| 14 | None | https://github.com/seed1337/CVE-2024-24919-POC | POC详情 |
| 15 | None | https://github.com/0x3f3c/CVE-2024-24919 | POC详情 |
| 16 | None | https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN | POC详情 |
| 17 | Nuclei template for CVE-2024-24919 | https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater | POC详情 |
| 18 | CVE-2024-24919 exploit | https://github.com/GoatSecurity/CVE-2024-24919 | POC详情 |
| 19 | Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs | https://github.com/GlobalsecureAcademy/CVE-2024-24919 | POC详情 |
| 20 | None | https://github.com/nexblade12/CVE-2024-24919 | POC详情 |
| 21 | This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919 | https://github.com/un9nplayer/CVE-2024-24919 | POC详情 |
| 22 | None | https://github.com/MohamedWagdy7/CVE-2024-24919 | POC详情 |
| 23 | Check Point Security Gateway (LFI) | https://github.com/Cappricio-Securities/CVE-2024-24919 | POC详情 |
| 24 | None | https://github.com/fernandobortotti/CVE-2024-24919 | POC详情 |
| 25 | None | https://github.com/nicolvsrlr27/CVE-2024-24919 | POC详情 |
| 26 | None | https://github.com/gurudattch/CVE-2024-24919 | POC详情 |
| 27 | Mass scanner for CVE-2024-24919 | https://github.com/YN1337/CVE-2024-24919 | POC详情 |
| 28 | CVE-2024-24919 [Check Point Security Gateway Information Disclosure] | https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner | POC详情 |
| 29 | Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check | POC详情 |
| 30 | Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN | POC详情 |
| 31 | None | https://github.com/J4F9S5D2Q7/CVE-2024-24919 | POC详情 |
| 32 | None | https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit | POC详情 |
| 33 | None | https://github.com/B1naryo/CVE-2024-24919-POC | POC详情 |
| 34 | a Proof of Concept of CVE-2024-24919 | https://github.com/Expl0itD0g/CVE-2024-24919---Poc | POC详情 |
| 35 | CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers. | https://github.com/bigb0x/CVE-2024-24919-Sniper | POC详情 |
| 36 | None | https://github.com/birdlex/cve-2024-24919-checker | POC详情 |
| 37 | CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access. | https://github.com/Rug4lo/CVE-2024-24919-Exploit | POC详情 |
| 38 | None | https://github.com/0nin0hanz0/CVE-2024-24919-PoC | POC详情 |
| 39 | Nmap script to check vulnerability CVE-2024-24919 | https://github.com/GuayoyoCyber/CVE-2024-24919 | POC详情 |
| 40 | None | https://github.com/0xans/CVE-2024-24919 | POC详情 |
| 41 | None | https://github.com/Tim-Hoekstra/CVE-2024-24919 | POC详情 |
| 42 | A Simple Exploit Code(POC) to Automate CVE-2024–24919 | https://github.com/starlox0/CVE-2024-24919-POC | POC详情 |
| 43 | CVE-2024-24919 exploit that checks more files for better visibility | https://github.com/nullcult/CVE-2024-24919-Exploit | POC详情 |
| 44 | None | https://github.com/satchhacker/cve-2024-24919 | POC详情 |
| 45 | None | https://github.com/P3wc0/CVE-2024-24919 | POC详情 |
| 46 | None | https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT | POC详情 |
| 47 | POC - CVE-2024–24919 - Check Point Security Gateways | https://github.com/verylazytech/CVE-2024-24919 | POC详情 |
| 48 | Python script to automate the process of finding vulnerable sites for CVE-2024-24919. | https://github.com/protonnegativo/CVE-2024-24919 | POC详情 |
| 49 | None | https://github.com/SalehLardhi/CVE-2024-24919 | POC详情 |
| 50 | None | https://github.com/ShadowByte1/CVE-2024-24919 | POC详情 |
| 51 | Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical. | https://github.com/H3KEY/CVE-2024-24919 | POC详情 |
| 52 | None | https://github.com/Jutrm/cve-2024-24919 | POC详情 |
| 53 | None | https://github.com/smkxt1/CVE-2024-24919 | POC详情 |
| 54 | None | https://github.com/yagyuufellinluvv/CVE-2024-24919 | POC详情 |
| 55 | None | https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919 | POC详情 |
| 56 | 🔍 Just wrapped up an incident report on a Phishing Alert (Event ID 257, SOC282). Enhancing my expertise in email threat detection and response! 🚨 #Cybersecurity #SOCAnalyst #LetsDefend | https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919- | POC详情 |
| 57 | None | https://github.com/0xYumeko/CVE-2024-24919 | POC详情 |
| 58 | PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses | https://github.com/geniuszlyy/CVE-2024-24919 | POC详情 |
| 59 | None | https://github.com/skyrowalker/CVE-2024-24919 | POC详情 |
| 60 | None | https://github.com/0xkalawy/CVE-2024-24919 | POC详情 |
| 61 | It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd | https://github.com/sar-3mar/CVE-2024-24919_POC | POC详情 |
| 62 | Check-Point安全网关任意文件读取漏洞(CVE-2024-24919) | https://github.com/NingXin2002/Check-Point_poc | POC详情 |
| 63 | PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses | https://github.com/geniuszly/CVE-2024-24919 | POC详情 |
| 64 | CVE-2024-24919 exploit that checks more files for better visibility | https://github.com/ronniensale/CVE-2024-24919-Exploit | POC详情 |
| 65 | SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919] | https://github.com/drake044/SOC_287 | POC详情 |
| 66 | SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919] | https://github.com/hashdr1ft/SOC_287 | POC详情 |
| 67 | None | https://github.com/funixone/CVE-2024-24919---Exploit-Script | POC详情 |
| 68 | None | https://github.com/spider00009/CVE-2024-24919-POC | POC详情 |
| 69 | None | https://github.com/0xlf/CVE-2024-24919 | POC详情 |
| 70 | None | https://github.com/ejaboz/cve-2024-24919 | POC详情 |
| 71 | Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml | POC详情 |
| 72 | None | https://github.com/zxcod3/CVE-2024-24919 | POC详情 |
| 73 | None | https://github.com/CyprianAtsyor/CVE-2024-24919-Incident-Report.md | POC详情 |
| 74 | None | https://github.com/CyberBibs/Event-ID-263-Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919- | POC详情 |
| 75 | None | https://github.com/MacUchegit/Detecting-and-Analyzing-CVE-2024-24919-Exploitation | POC详情 |
| 76 | None | https://github.com/SpiX-7/CVE-2024-24919-POC | POC详情 |
| 77 | None | https://github.com/0zerobyte/CVE-2024-24919 | POC详情 |
| 78 | None | https://github.com/voidbroker/CVE-2024-24919 | POC详情 |
暂无评论