Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Check Point Security Gateways 安全漏洞

Source
Associated Vulnerability
Title:Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
Description:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Description
This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919
Readme
# CVE-2024-24919 Exploit

## Overview

This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files.
**CVE ID**: CVE-2024-24919

**Severity**: Critical

## Table of Contents

- [Vulnerability-details](https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/)
- [Exploit Details](#exploit-details)


## Usage

1. Clone the repository:
    ```bash
    git clone https://github.com/un9nplayer/CVE-2024-24919.git
    cd CVE-2024-24919
    ```
    
2. Target/IP must be in domain-IP.txt
   ```bash
   echo "[target/IP]" >> domain-IP.txt
   ```
   
3. Run the exploit:
    ```bash
    python3 CVE-2024-24919.py 
    ```


## POC Video

[![YouTube](http://i.ytimg.com/vi/h7iWwEBmlck/hqdefault.jpg)](https://www.youtube.com/watch?v=h7iWwEBmlck)
File Snapshot

[4.0K] /data/pocs/e0b6f476ec2bbf39678d0d08b626e1ccd4c0bffb ├── [2.7K] CVE-2024-24919.py └── [ 876] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.