关联漏洞
介绍
**CVE-2024-24919<br>
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.**<br>
**FIRST:**<br>
**I AM NOT RESPONSIBLE FOR WHAT YOU DO WITH IT.**
**SECOND:**<br>
**apt-get install parallel curl -y**<br>
**chmod +x SCAN-CVE-2024-24919.sh CVE-2024-24919.sh**
**SCAN-CVE-2024-24919.sh:**
<br>IT IS FOR SCANNING A LIST OF TARGETS THE DEFAULT FILE FOR INSERTING TARGETS IS "targets" USE "nano targets".</br>
THE VULNERABLES WILL BE SAVED IN THE "vulnerables.txt" FILE.
**CVE-2024-24919.sh:**
IT IS USED TO EXTRACT FILES FROM THE FOLLOWING SERVER DIRECTORIES:</br>
/etc/passwd<br>
/etc/shadow<br>
/var/log/auth<br>
/var/log/messages<br>
THE PASSWD AND SHADOW DATA WILL BE SHOWN ON YOUR SCREEN.<br>
**THE AUTH AND MESSAGES WILL BE WRITTEN IN THE "messages.checkpoint" AND "auth.checkpoint" FILES.**
I THINK THERE ARE NO DOUBTS, UNTIL NEXT TIME!
文件快照
[4.0K] /data/pocs/48e82b94bcc6578f72af1b13c2fc070f8860b1a9
├── [1.7K] CVE-2024-24919.sh
├── [1.0K] README.md
└── [ 473] SCAN-CVE-2024-24919.sh
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。