Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Check Point Security Gateways 安全漏洞

Source
Associated Vulnerability
Title:Check Point Security Gateways 安全漏洞 (CVE-2024-24919)
Description:Check Point Security Gateways是以色列Check Point公司的一个人工智能驱动的 NGFW 安全网关。 Check Point Security Gateways 存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Readme
# CVE_2024_24919 Vulnerability Scanner

This Java tool scans a list of IP addresses for the CVE-2024-24919 vulnerability. It attempts to exploit the vulnerability and provides options to print the response body data and change the target file directory.

## Table of Contents

- [Usage](#usage)
- [Features](#features)
- [Installation](#installation)
- [Running the Tool](#running-the-tool)
- [License](#license)

## Usage

The tool reads a list of IP addresses from a file named `domain-IP.txt`, checks each IP for the CVE-2024-24919 vulnerability, and provides interactive options for further actions based on the results.

### Features

- **Vulnerability Check**: Verifies if the IP address is vulnerable to CVE-2024-24919.
- **Interactive Response**: Prompts the user to print the response body data and change the file directory for more in-depth vulnerability exploitation.

## Installation

1. **Clone the Repository**:
    ```sh
    git clone https://github.com/yourusername/CVE_2024_24919_Scanner.git
    cd CVE_2024_24919_Scanner
    ```

2. **Ensure Java is Installed**:
    Make sure you have Java installed on your system. You can download it from [here](https://www.java.com/en/download/).

3. **Prepare the IP List**:
    Create a file named `domain-IP.txt` in the root directory of the project and list the IP addresses you want to check, one per line.

## Running the Tool

Compile and run the Java program with the following commands:

```sh
javac CVE_2024_24919.java
java CVE_2024_24919
File Snapshot

[4.0K] /data/pocs/e2fdcecee518dc3c4a78a6beebfcf59074747c23 ├── [3.8K] CVE_2024_24919.java ├── [ 34K] LICENSE └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.