POC详情: 053671ac7c4dd8a9f4150ba158fceb54e95dbd72

来源
关联漏洞
标题: Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
描述:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
介绍
# Exploit for CVE-2024-24919

## Description

This Python script is an exploit for CVE-2024-24919, a CVE that hitted Check Point Products: (CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Spark Appliances) Versions: (R77.20 (EOL), R77.30 (EOL), R80.10 (EOL), R80.20 (EOL), R80.20.x, R80.20SP (EOL), R80.30 (EOL), R80.30SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, R81.20), allowing unauthorized access to sensitive files on a target system. It targets a vulnerability in the `/clients/MyCRL` endpoint

![Running](image.png)

## Installation

```bash
git clone https://github.com/MohamedWagdy7/CVE-2024-24919
```

## target.txt

is a file contains number of targets running vulnerable version, these targets enumerated from shodan using this dork `"Server: Check Point SVN" "X-UA-Compatible: IE=EmulateIE7" 200 country:"IL"`

## Usage

```bash
python exploit.py -d <target> [-f <file>] [-proxy <proxy>] [-o <output>]
python exploit.py -l <list> [-f <file>] [-proxy <proxy>] [-o <output>]
```

### Example

```bash
python exploit.py -l ./targets.txt -proxy 127.0.0.1:8080 -o CVE-2024-24919.txt
```

## Arguments

- -d, --target: Specifies a single target to be tested.
- -l, --list: Specifies a list of targets to be tested.
- -f, --file: Specifies a file to exploit (default: /etc/passwd).
- -proxy, --proxy: Specifies a proxy to use for requests.
- -o, --output: Specifies a filename to save the output (default: output.txt).

## References

[Watchtowr Labs - Wrong Check Point](https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/)

[Check Point Support](https://support.checkpoint.com/results/sk/sk182337?ref=labs.watchtowr.com)

[NVD - CVE-2024-24919](https://nvd.nist.gov/vuln/detail/CVE-2024-24919)
文件快照

[4.0K] /data/pocs/053671ac7c4dd8a9f4150ba158fceb54e95dbd72 ├── [3.0K] exploit.py ├── [ 53K] image.png ├── [1.7K] README.md └── [174K] targets.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。