Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Check Point Security Gateways 安全漏洞

Source
Associated Vulnerability
Title:Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
Description:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Description
CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers.
Readme
# CVE-2024-24919-Sniper

![CVE-2024-24919 Sniper Screenshot](sniper-screenshot.png)

## Overview

CVE-2024-24919 Sniper is a Python script designed to scan for Check Point Security Gateway Information Disclosure vulnerabilities. This script can perform both single-target and bulk scanning, utilizing multithreading to improve scanning speed. It supports various command-line options to specify targets and control the scanning behavior.

## Features

- Scans and exploit CVE-2024-24919 vulnerability
- Supports single-target and bulk scanning
- Multithreaded scanning for improved performance
- Generates a CSV report with scan results
- ANSI color-coded output for better readability


## Installation

### Prerequisites

- Python 3.6+
- pip (Python package installer)

### Install Dependencies

1. **Clone the repository**:

    ```sh
    git clone https://github.com/yourusername/CVE-2024-24919-Sniper.git
    cd CVE-2024-24919-Sniper
    ```

2. **Install the required Python packages**:

    ```sh
    pip install -r requirements.txt
    ```

## Usage

### Command-Line Options

The script supports various command-line options to specify the target, mode, and other parameters.

- `-u`, `--url`: Target URL or IP address
- `-r`, `--remote-path`: Remote file path to read (default: `/etc/passwd`)
- `-f`, `--file`: File containing a list of target URLs or IPs (one per line)
- `-t`, `--threads`: Number of threads to use for scanning (default: 3)

### Examples

#### Exploiting a Single Target

To scan a single target:

```sh
python3 cve-2024-24919-sniper.py -u TARGET-IP -r remote-file-to-read -t number-of-threads
```

![CVE-2024-24919 Sniper Screenshot](sniper-screenshot2.png)


### Bulk Scan

To scan multiple targets from a file:
```sh
python3 cve-2024-24919-sniper.py -f targets.txt
```

### Custom Number of Threads

To specify the number of threads:
```sh
python3 cve-2024-24919-sniper.py -f targets.txt -t 5
```

## Output Report

The script will generate a CSV report named `sniper-out.csv` containing the scan results with the following columns:

- Host
- Vulnerable
- Status
- Last Scan Date

## Handling Interruptions

You can stop the script at any time by pressing `Ctrl+C`. The script will handle the interruption gracefully and exit.

## Contact

For any questions or feedback, you can reach out to the author:

- Twitter: [@MohamedNab1l](https://x.com/MohamedNab1l)

## Disclaimer

This tool is intended only for educational and authorized testing purposes. Use it at your own risk. Do not scan or attack targets that you do not have explicit permission to test.

File Snapshot

[4.0K] /data/pocs/a3c5626ab3fe8eb3a5772daea130e487a0d3471e ├── [6.9K] cve-2024-24919-sniper.py ├── [2.5K] README.md ├── [ 66] requirements.txt ├── [ 86K] screenshot.png ├── [ 78K] sniper-screenshot2.png └── [ 86K] sniper-screenshot.png 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.