Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Information disclosure

Source
Associated Vulnerability
Title:Information disclosure (CVE-2024-24919)
Description:Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Description
CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers.
Readme
# CVE-2024-24919-Sniper

![CVE-2024-24919 Sniper Screenshot](sniper-screenshot.png)

## Overview

CVE-2024-24919 Sniper is a Python script designed to scan for Check Point Security Gateway Information Disclosure vulnerabilities. This script can perform both single-target and bulk scanning, utilizing multithreading to improve scanning speed. It supports various command-line options to specify targets and control the scanning behavior.

## Features

- Scans and exploit CVE-2024-24919 vulnerability
- Supports single-target and bulk scanning
- Multithreaded scanning for improved performance
- Generates a CSV report with scan results
- ANSI color-coded output for better readability


## Installation

### Prerequisites

- Python 3.6+
- pip (Python package installer)

### Install Dependencies

1. **Clone the repository**:

    ```sh
    git clone https://github.com/yourusername/CVE-2024-24919-Sniper.git
    cd CVE-2024-24919-Sniper
    ```

2. **Install the required Python packages**:

    ```sh
    pip install -r requirements.txt
    ```

## Usage

### Command-Line Options

The script supports various command-line options to specify the target, mode, and other parameters.

- `-u`, `--url`: Target URL or IP address
- `-r`, `--remote-path`: Remote file path to read (default: `/etc/passwd`)
- `-f`, `--file`: File containing a list of target URLs or IPs (one per line)
- `-t`, `--threads`: Number of threads to use for scanning (default: 3)

### Examples

#### Exploiting a Single Target

To scan a single target:

```sh
python3 cve-2024-24919-sniper.py -u TARGET-IP -r remote-file-to-read -t number-of-threads
```

![CVE-2024-24919 Sniper Screenshot](sniper-screenshot2.png)


### Bulk Scan

To scan multiple targets from a file:
```sh
python3 cve-2024-24919-sniper.py -f targets.txt
```

### Custom Number of Threads

To specify the number of threads:
```sh
python3 cve-2024-24919-sniper.py -f targets.txt -t 5
```

## Output Report

The script will generate a CSV report named `sniper-out.csv` containing the scan results with the following columns:

- Host
- Vulnerable
- Status
- Last Scan Date

## Handling Interruptions

You can stop the script at any time by pressing `Ctrl+C`. The script will handle the interruption gracefully and exit.

## Contact

For any questions or feedback, you can reach out to the author:

- Twitter: [@MohamedNab1l](https://x.com/MohamedNab1l)

## Disclaimer

This tool is intended only for educational and authorized testing purposes. Use it at your own risk. Do not scan or attack targets that you do not have explicit permission to test.

File Snapshot

[4.0K] /data/pocs/a3c5626ab3fe8eb3a5772daea130e487a0d3471e ├── [6.9K] cve-2024-24919-sniper.py ├── [2.5K] README.md ├── [ 66] requirements.txt ├── [ 86K] screenshot.png ├── [ 78K] sniper-screenshot2.png └── [ 86K] sniper-screenshot.png 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →