POC详情: e046a8429860e85550b24967e15ddaefaf484130

来源
关联漏洞
标题: Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
描述:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
介绍
<img width="1536" height="785" alt="cover photo" src="https://github.com/user-attachments/assets/d74d2dec-e75c-44a2-9204-88d3098573d8" />

# 🔍 Investigating a Zero-Day Attack Using Let’s Defend SIEM

### 👉 A Walkthrough on Detecting and Analyzing CVE-2024-24919 Exploitation

---

## 🎯 **Purpose of the Investigation**

This project was conducted to **investigate a potential exploitation attempt** against a Check Point Security Gateway, specifically leveraging a **zero-day vulnerability – CVE-2024-24919**. The goal was to determine if this alert was a false positive or a legitimate breach attempt, analyze the traffic, and take appropriate containment and response steps.

---

## 🛠️ **Tools & Environment Used**

* **SIEM Platform**: Let’s Defend (cloud-based threat detection and investigation tool)
* **Virtual Lab**: Provided within Let’s Defend
* **Targeted Host**: CP-Spark-Gateway-01
* **Log Analysis Features**: HTTP traffic logs, endpoint filtering, email security console
* **Threat Intelligence**: Online sources such as NVD and Check Point security advisories

---

## ⭐ Alert Overview

* **Rule Triggered**: SOC287 - Arbitrary File Read on Check Point Gateway (CVE-2024-24919)
* **Event ID**: 263
* **Timestamp**: June 6, 2024, 03:12 PM
* **Destination IP**: `172.16.20.146`
* **Source IP**: `203.160.68.12`
* **Device Action**: Allowed
* **Request**: `aCSHELL/../../../../../../../../../../etc/passwd`
* **User-Agent**: Spoofed as Mozilla Firefox on Mac OS X

---

## 🧪 **Pre-Analysis: Understanding CVE-2024-24919**

**CVE-2024-24919** is a **zero-day path traversal vulnerability** affecting Check Point Security Gateways. It allows **unauthenticated remote attackers** to read arbitrary files, such as `/etc/passwd` and `/etc/shadow`, by sending crafted HTTP requests to vulnerable endpoints.

🔗 *[Check Point Advisory](https://support.checkpoint.com/results/sk/sk182336)*

This type of request (seen in our logs) is consistent with this vulnerability and **triggers alerts due to its attempt to exploit system file reads**.

---

## 🔎 **Step 1: Analyze HTTP Traffic**

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/c69a6361-393f-4657-b8ec-e2c3e4c15fff"/>

I navigated to the **Log Management page**, filtered for **Destination IP `172.16.20.146`**, and inspected incoming HTTP traffic.

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/a84861ff-a90d-4833-b9b9-4ad770024cdd"/>

### 🔥 Key Findings:

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/8d1a8db6-b250-48fe-b162-2e2ed4638e30"/>

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/aa0635c2-cc27-4bca-8518-1afce43d9401"/>

| Timestamp | Request Path   | Payload                          |
| --------- | -------------- | -------------------------------- |
| 15:12:45  | /clients/MyCRL | `aCSHELL/../../../../etc/passwd` |
| 15:13:10  | /clients/MyCRL | `aCSHELL/../../../../etc/shadow` |

* The payload clearly attempts **path traversal** to read critical system files.
* These files are used to store user credentials and password hashes.
* HTTP Status **200** with **Response Size: 1256 bytes** indicates the server returned data successfully — **suggesting exploitation succeeded**.

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/0ec43851-ddee-4481-a832-2a49024b5b98"/>

---

## 🚨 **Step 2: What Type of Attack Is This?** 

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/23c2dc73-63a0-41b5-83a8-8f39aa0ed890"/>

This is a **Path Traversal Attack**, also known as **Directory Traversal**.
It allows attackers to **navigate outside the intended web directory** and access protected system files.

**Why we concluded this:**

* Requests contain repeated `../` (dot-dot-slash) patterns.
* Targeted files like `/etc/passwd` and `/etc/shadow` are standard indicators.

---

## 🧪 **Step 3: Was This a Planned Test?**

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/eb6d75a2-3ddd-4c1d-ada8-baf407b299c6"/>

I checked the **Email Security Page** and searched using these keywords: 

* `172.16.20.146`
* `CP-Spark-Gateway-01` 
* `CVE-2024-24919`
* `penetration test`

🔍 **No emails or documentation** suggested this was a test. This likely rules out a simulation or red-team operation.

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/a5118f01-460b-478d-89fa-76bb05043a62"/>

---

## 🌐 **Step 4: Traffic Direction Analysis**

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/4b286c78-dc04-4ab7-8537-48ed8af79bc8"/>

**Source IP:** `203.160.68.12` → **Public IP Address**
**Destination IP:** `172.16.20.146` → **Private IP Address** (RFC 1918 range)

### 🔁 Direction: **Internet → Company Network**

This confirms the traffic is **coming from an external attacker** targeting internal infrastructure.

---

## 🧠 **Step 5: Was the Attack Successful?** 

The HTTP log shows:

```
"POST /clients/MyCRL HTTP/1.1" 200 1256
```

* **HTTP 200 OK** indicates success.
* **Response size (1256 bytes)** suggests the system returned data.
* The attacker likely accessed `/etc/passwd`, validating a **successful exploit**.

---

## 🛡️ **Containment Steps** 

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/a44e2554-e31c-42f6-b5c8-8f6d2c9ed235"/>

I accessed the **Endpoint page**, filtered by the **destination IP `172.16.20.146`**, and issued a **containment action** to isolate the host.

**Why?**

* Host has been compromised.
* It could be used to pivot or exfiltrate data.

---

## 🧾 **Step 6: Documenting IOCs**

### Why It Matters:

Indicators of Compromise (IOCs) are crucial for:

* Notifying external threat intelligence communities
* Writing future detection rules
* Strengthening security posture

### 📌 IOCs Identified:

* **Source IP**: `203.160.68.12`, `203.160.68.13`
* **User-Agent**: `Mozilla/5.0 (Mac OS X; rv:126.0)`
* **Request Paths**:

  * `/clients/MyCRL`
  * Payloads: `../../../../etc/passwd`, `../../../../etc/shadow`
* **Target Port**: 4433 (non-standard HTTPS)

---

## ⬆️ **Step 7: Tier 2 Escalation?** 

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/2af7b44c-4fbd-4d34-9ea4-7b9ae1a4591f"/>

✅ **Yes** — This is a **zero-day vulnerability** successfully exploited in a **live environment**, exposing sensitive files.

Escalation is essential for: 

* Deep forensics
* Patch validation
* Coordinating legal, compliance, and executive stakeholders

---

## 📄 **Step 8: Final Analysis & Comment**

I **closed the alert as a True Positive**.

<img width="931" alt="image" style="display: block; margin: 0 auto;" src="https://github.com/user-attachments/assets/0c31de9c-ac6d-49d4-8f9e-6fa2120dcbff"/>

### 📝 Brief Comment:

> "Alert confirmed as CVE-2024-24919 exploitation. External IP `203.160.68.12` successfully accessed sensitive system files via path traversal. Host CP-Spark-Gateway-01 has been contained. IOC documentation completed. Escalated to Tier 2 for advanced forensics and patch verification."

---

## 🔐 **Prevention Recommendations**

* 🧱 Apply vendor patch for CVE-2024-24919 immediately (Check Point Hotfix).
* 🔒 Block access to `/clients/MyCRL` endpoint externally.
* 🧬 Implement WAF rules for traversal patterns (`../`, `..%2F`).
* 🔍 Monitor for abnormal port activity (e.g., 4433).
* 🔄 Regularly update and audit firewall + SIEM rules.
* 📚 Conduct internal training on recent zero-day threats.

---

## ✅ **Conclusion**

This investigation highlights the **critical importance of proactive threat monitoring and response**. Detecting and responding to **zero-day exploits** quickly can make the difference between a contained incident and a widespread breach.
文件快照

[4.0K] /data/pocs/e046a8429860e85550b24967e15ddaefaf484130 └── [8.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。