关联漏洞
描述
This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919
介绍
# CVE-2024-24919 Exploit
## Overview
This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files.
**CVE ID**: CVE-2024-24919
**Severity**: Critical
## Table of Contents
- [Vulnerability-details](https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/)
- [Exploit Details](#exploit-details)
## Usage
1. Clone the repository:
```bash
git clone https://github.com/un9nplayer/CVE-2024-24919.git
cd CVE-2024-24919
```
2. Target/IP must be in domain-IP.txt
```bash
echo "[target/IP]" >> domain-IP.txt
```
3. Run the exploit:
```bash
python3 CVE-2024-24919.py
```
## POC Video
[](https://www.youtube.com/watch?v=h7iWwEBmlck)
文件快照
[4.0K] /data/pocs/e0b6f476ec2bbf39678d0d08b626e1ccd4c0bffb
├── [2.7K] CVE-2024-24919.py
└── [ 876] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。