关联漏洞
描述
Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs
介绍
# CVE-2024-24919
Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs
This tool creates an output folder containing a "Target-IP.txt" file. This file includes the contents of the /etc/passwd file from the affected target, thereby determining if the system is vulnerable or not.
In order to run this tool you only need Python 3. To run the tool, use the following command:
python3 CVE-2024-24919.py -i Target-IP
more information about the vulnerability on:
https://thehackernews.com/2024/05/check-point-warns-of-zero-day-attacks.html
https://nvd.nist.gov/vuln/detail/CVE-2024-24919
https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/
# Remember to use this tool only on systems for which you have authorization.
# This tool is intended solely for research and security auditing purposes.
Manuel Moreno - GLOBALSECURE
https://www.linkedin.com/in/manu0x01/
文件快照
[4.0K] /data/pocs/87e87de725e86d1d8f3e8710114ef25a2336b29b
├── [1.9K] CVE-2024-24919.py
└── [ 955] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。