Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Information disclosure

Source
Associated Vulnerability
Title:Information disclosure (CVE-2024-24919)
Description:Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Description
Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)
Readme
# Check-Point_poc
Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)

python Check-Point_poc.py -h              

                ) (`-.            ) (`-.
         ( OO ).           ( OO ).
        (_/.  \_)-. ,-.-')(_/.  \_)-. ,-.-')
         \  `.'  /  |  |OO)\  `.'  /  |  |OO)
          \     /\  |  |  \ \     /\  |  |  \
           \   \ |  |  |(_/  \   \ |  |  |(_/
          .'    \_),|  |_.' .'    \_),|  |_.'
         /  .'.  \(_|  |   /  .'.  \(_|  |
        '--'   '--' `--'  '--'   '--' `--'


usage: Check-Point_poc.py [-h] [-u URL] [-f FILE]  

Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)  

optional arguments:  
  -h, --help            show this help message and exit  
  -u URL, --url URL     添加url信息  
  -f FILE, --file FILE  添加txt文件  

example:  
    python3 Check-Point_poc.py -u http://xxxx.xxxx.xxxx.xxxx  
    python3 Check-Point_poc.py -f x_url.txt  
File Snapshot

[4.0K] /data/pocs/dedba5ab8363c4d2e0c25a3b841da832cbad4837 ├── [2.8K] Check-Point_poc.py └── [ 925] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →