Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Check Point Security Gateways 安全漏洞

Source
Associated Vulnerability
Title:Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
Description:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Readme
**CVE-2024-24919<br>
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.**<br>

**FIRST:**<br>
**I AM NOT RESPONSIBLE FOR WHAT YOU DO WITH IT.**

**SECOND:**<br>
**apt-get install parallel curl -y**<br>
**chmod +x SCAN-CVE-2024-24919.sh CVE-2024-24919.sh**

**SCAN-CVE-2024-24919.sh:**
<br>IT IS FOR SCANNING A LIST OF TARGETS THE DEFAULT FILE FOR INSERTING TARGETS IS "targets" USE "nano targets".</br>
THE VULNERABLES WILL BE SAVED IN THE "vulnerables.txt" FILE.

**CVE-2024-24919.sh:**
IT IS USED TO EXTRACT FILES FROM THE FOLLOWING SERVER DIRECTORIES:</br>
/etc/passwd<br>
/etc/shadow<br>
/var/log/auth<br>
/var/log/messages<br>
THE PASSWD AND SHADOW DATA WILL BE SHOWN ON YOUR SCREEN.<br>
**THE AUTH AND MESSAGES WILL BE WRITTEN IN THE "messages.checkpoint" AND "auth.checkpoint" FILES.**

I THINK THERE ARE NO DOUBTS, UNTIL NEXT TIME!
File Snapshot

[4.0K] /data/pocs/c0ba1cdb038bd02aee7f9a338823be2200a88e66 ├── [1.7K] CVE-2024-24919.sh ├── [1.0K] README.md └── [ 473] SCAN-CVE-2024-24919.sh 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.