POC详情: a3c5626ab3fe8eb3a5772daea130e487a0d3471e

来源
关联漏洞
标题: Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
描述:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
描述
CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers.
介绍
# CVE-2024-24919-Sniper

![CVE-2024-24919 Sniper Screenshot](sniper-screenshot.png)

## Overview

CVE-2024-24919 Sniper is a Python script designed to scan for Check Point Security Gateway Information Disclosure vulnerabilities. This script can perform both single-target and bulk scanning, utilizing multithreading to improve scanning speed. It supports various command-line options to specify targets and control the scanning behavior.

## Features

- Scans and exploit CVE-2024-24919 vulnerability
- Supports single-target and bulk scanning
- Multithreaded scanning for improved performance
- Generates a CSV report with scan results
- ANSI color-coded output for better readability


## Installation

### Prerequisites

- Python 3.6+
- pip (Python package installer)

### Install Dependencies

1. **Clone the repository**:

    ```sh
    git clone https://github.com/yourusername/CVE-2024-24919-Sniper.git
    cd CVE-2024-24919-Sniper
    ```

2. **Install the required Python packages**:

    ```sh
    pip install -r requirements.txt
    ```

## Usage

### Command-Line Options

The script supports various command-line options to specify the target, mode, and other parameters.

- `-u`, `--url`: Target URL or IP address
- `-r`, `--remote-path`: Remote file path to read (default: `/etc/passwd`)
- `-f`, `--file`: File containing a list of target URLs or IPs (one per line)
- `-t`, `--threads`: Number of threads to use for scanning (default: 3)

### Examples

#### Exploiting a Single Target

To scan a single target:

```sh
python3 cve-2024-24919-sniper.py -u TARGET-IP -r remote-file-to-read -t number-of-threads
```

![CVE-2024-24919 Sniper Screenshot](sniper-screenshot2.png)


### Bulk Scan

To scan multiple targets from a file:
```sh
python3 cve-2024-24919-sniper.py -f targets.txt
```

### Custom Number of Threads

To specify the number of threads:
```sh
python3 cve-2024-24919-sniper.py -f targets.txt -t 5
```

## Output Report

The script will generate a CSV report named `sniper-out.csv` containing the scan results with the following columns:

- Host
- Vulnerable
- Status
- Last Scan Date

## Handling Interruptions

You can stop the script at any time by pressing `Ctrl+C`. The script will handle the interruption gracefully and exit.

## Contact

For any questions or feedback, you can reach out to the author:

- Twitter: [@MohamedNab1l](https://x.com/MohamedNab1l)

## Disclaimer

This tool is intended only for educational and authorized testing purposes. Use it at your own risk. Do not scan or attack targets that you do not have explicit permission to test.

文件快照

[4.0K] /data/pocs/a3c5626ab3fe8eb3a5772daea130e487a0d3471e ├── [6.9K] cve-2024-24919-sniper.py ├── [2.5K] README.md ├── [ 66] requirements.txt ├── [ 86K] screenshot.png ├── [ 78K] sniper-screenshot2.png └── [ 86K] sniper-screenshot.png 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。