关联漏洞
描述
Mass scanner for CVE-2024-24919
介绍
Mass Auto Scanner for CVE-2024-24919
This script is designed to scan a list of URLs for the CVE-2024-24919 vulnerability on remote Check Point firewalls. It attempts to exploit the vulnerability by sending a malicious POST request to extract specified files from the target servers.
--------------------------------------------------------------------------------
Running the Script
Save the provided script to a Python file, for example, mass_auto_scanner.py.
Open a terminal or command prompt.
Navigate to the directory where you saved mass_auto_scanner.py and the urls.txt file.
Run the script using the following command:
--------------------------------------------------------------------------------
python scanner.py -l urls.txt -f /etc/passwd -o results.txt
--------------------------------------------------------------------------------
Ethical Considerations
Warning: This script is intended for ethical hacking and penetration testing purposes only. Unauthorized scanning of systems is illegal and unethical. Use this script only on systems you have explicit permission to test. Responsible disclosure to affected vendors is crucial to allow them to patch any discovered vulnerabilities.
文件快照
[4.0K] /data/pocs/71405271c1d203a50731d66cda8517274e888017
├── [1.2K] README.md
├── [2.2K] scanner.py
└── [ 76] urls.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。