nomisec
WORKING POC
47 stars
by seed1337 · infoleak
https://github.com/seed1337/CVE-2024-24919-POC
This repository contains a functional exploit for CVE-2024-24919, an arbitrary file read vulnerability in Check Point SSL Network Extender. The exploit sends a crafted POST request to '/clients/MyCRL' with a path traversal payload to read sensitive files like '/etc/shadow'.
Classification
Working Poc 95%
Target:
Check Point SSL Network Extender
No auth needed
Prerequisites:
Network access to the vulnerable Check Point appliance
nomisec
SCANNER
32 stars
by ifconfig-me · infoleak
https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner
The repository contains a bulk scanner for CVE-2024-24919, which checks for vulnerable Check Point endpoints by sending crafted POST requests to '/clients/MyCRL' and analyzing response headers. It does not include exploit code for achieving RCE or other offensive actions, only detection logic.
Classification
Scanner 95%
Target:
Check Point SVN foundation
No auth needed
Prerequisites:
List of target URLs · Network access to target endpoints
nomisec
WORKING POC
25 stars
by RevoltSecurities · infoleak
https://github.com/RevoltSecurities/CVE-2024-24919
The repository contains a functional exploit for CVE-2024-24919, targeting Check Point VPN appliances. The exploit leverages a path traversal vulnerability to dump sensitive files (e.g., /etc/passwd) from vulnerable systems.
Classification
Working Poc 95%
Target:
Check Point VPN (versions affected by CVE-2024-24919)
No auth needed
Prerequisites:
Network access to vulnerable Check Point VPN appliance
nomisec
WORKING POC
19 stars
by GoatSecurity · infoleak
https://github.com/GoatSecurity/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, a path traversal vulnerability in Check Point Security Gateway, to read arbitrary files. The exploit sends crafted HTTP requests to the vulnerable endpoint `/clients/MyCRL` with traversal sequences to access sensitive files.
Classification
Working Poc 95%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Network access to the vulnerable Check Point Security Gateway
nomisec
WORKING POC
16 stars
by un9nplayer · infoleak
https://github.com/un9nplayer/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, a critical vulnerability in Check Point SVN allowing arbitrary file read via directory traversal. The script uses curl commands to send crafted POST requests to read system files like /etc/passwd.
Classification
Working Poc 90%
Target:
Check Point SVN
No auth needed
Prerequisites:
Target IP addresses listed in 'domain-IP.txt' · Network access to the vulnerable Check Point SVN instance
nomisec
WORKING POC
13 stars
by LucasKatashi · infoleak
https://github.com/LucasKatashi/CVE-2024-24919
The PoC exploits a path traversal vulnerability in Check Point SSL Network Extender by sending a crafted POST request to the '/clients/MyCRL' endpoint, allowing arbitrary file read access. The script uses a directory traversal payload to read files like '/etc/passwd'.
Classification
Working Poc 95%
Target:
Check Point SSL Network Extender
No auth needed
Prerequisites:
Network access to the target · Target running vulnerable Check Point SSL Network Extender
nomisec
WORKING POC
11 stars
by 0nin0hanz0 · infoleak
https://github.com/0nin0hanz0/CVE-2024-24919-PoC
This repository contains a functional Python exploit for CVE-2024-24919, an unauthenticated file read vulnerability in Check Point Security Gateways. The exploit sends a crafted POST request to read sensitive files (e.g., /etc/shadow) via path traversal.
Classification
Working Poc 95%
Target:
Check Point Security Gateway (with remote Access VPN or Mobile Access Software Blades)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Check Point Security Gateway · Remote Access VPN or Mobile Access Software Blades must be enabled
nomisec
WORKING POC
9 stars
by verylazytech · infoleak
https://github.com/verylazytech/CVE-2024-24919
The repository contains a functional exploit for CVE-2024-24919, targeting Check Point Security Gateways with an information disclosure vulnerability. The PoC sends crafted HTTP requests to read sensitive files like /etc/passwd and /etc/shadow via path traversal.
Classification
Working Poc 95%
Target:
Check Point Security Gateways (with Remote Access VPN or Mobile Access Software Blades)
No auth needed
Prerequisites:
Target must be running Check Point Security Gateway with Remote Access VPN or Mobile Access Software Blades enabled · Target must be accessible via HTTP/HTTPS
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2024/CVE-2024-24919.md
The repository contains a detailed technical writeup for CVE-2024-24919, a critical unauthenticated information disclosure vulnerability in Check Point's Remote Access VPN. It includes reconnaissance dorks, mitigation tips, and references to external PoCs but does not contain functional exploit code.
Classification
Writeup 90%
Target:
Check Point SSL Network Extender (VPN)
No auth needed
Prerequisites:
Access to vulnerable Check Point VPN endpoint
nomisec
SCANNER
7 stars
by c3rrberu5 · infoleak
https://github.com/c3rrberu5/CVE-2024-24919
This repository contains a Nuclei template for detecting CVE-2024-24919, a path traversal vulnerability in CheckPoint SSLVPN. The template sends a crafted POST request to exploit the vulnerability and checks for a successful response.
Classification
Scanner 90%
Target:
CheckPoint SSLVPN
No auth needed
Prerequisites:
Access to the target SSLVPN endpoint
nomisec
SCANNER
6 stars
by geniuszly · infoleak
https://github.com/geniuszly/CVE-2024-24919
The repository contains a Python script designed to scan for CVE-2024-24919 by sending POST requests to target URLs and analyzing responses for markers of vulnerability, such as sensitive file exposure (e.g., /etc/shadow). It does not include exploit code for achieving arbitrary code execution or privilege escalation.
Classification
Scanner 90%
Target:
Unknown (likely a web application with path traversal vulnerability)
No auth needed
Prerequisites:
List of target URLs · Network access to targets
nomisec
SCANNER
5 stars
by smackerdodi · infoleak
https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater
The repository contains a Nuclei template for detecting CVE-2024-24919, a path traversal vulnerability in Check Point software. The template sends a crafted POST request to retrieve the /etc/passwd file and checks for a successful response.
Classification
Scanner 90%
Target:
Check Point (version not specified)
No auth needed
Prerequisites:
Network access to the target system
nomisec
WORKING POC
5 stars
by emanueldosreis · infoleak
https://github.com/emanueldosreis/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, a path traversal vulnerability in Checkpoint firewall, allowing unauthorized file retrieval (e.g., /etc/passwd) via a crafted POST request to the 'clients/MyCRL' endpoint.
Classification
Working Poc 95%
Target:
Checkpoint Firewall (specific version not specified)
No auth needed
Prerequisites:
Network access to the target Checkpoint firewall · Vulnerable endpoint exposed
nomisec
SCANNER
4 stars
by GuayoyoCyber · infoleak
https://github.com/GuayoyoCyber/CVE-2024-24919
This repository provides an Nmap script to detect the presence of CVE-2024-24919, a vulnerability in Check Point SSL Network Extender. It includes dorks for vulnerability hunting and an example of how to use the Nmap script.
Classification
Scanner 90%
Target:
Check Point SSL Network Extender
No auth needed
Prerequisites:
Nmap installed · Network access to target
nomisec
WORKING POC
4 stars
by zam89 · infoleak
https://github.com/zam89/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, an arbitrary file read vulnerability in Check Point software. The script sends crafted POST requests to read sensitive files like /etc/shadow or SSH private keys.
Classification
Working Poc 95%
Target:
Check Point (version not specified)
No auth needed
Prerequisites:
List of target IPs/hosts · Network access to vulnerable Check Point instances
nomisec
WORKING POC
3 stars
by Rug4lo · infoleak
https://github.com/Rug4lo/CVE-2024-24919-Exploit
This repository contains a functional Python exploit for CVE-2024-24919, a path traversal vulnerability in Check Point Security Gateways. The exploit sends a crafted POST request to the `/clients/MyCRL` endpoint to read arbitrary files from the target system.
Classification
Working Poc 95%
Target:
Check Point Security Gateways with remote access VPN or mobile access software enabled
No auth needed
Prerequisites:
Target must have Check Point Security Gateways with vulnerable endpoint exposed
nomisec
SCANNER
3 stars
by GlobalsecureAcademy · infoleak
https://github.com/GlobalsecureAcademy/CVE-2024-24919
The repository contains a Python script that checks for CVE-2024-24919 by sending a crafted HTTP POST request to a Checkpoint Firewall VPN endpoint and analyzing the response for the presence of '/etc/passwd' content. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 90%
Target:
Checkpoint Firewall VPN
No auth needed
Prerequisites:
Network access to the target Checkpoint Firewall VPN
nomisec
SCANNER
3 stars
by Bytenull00 · infoleak
https://github.com/Bytenull00/CVE-2024-24919
The repository contains a bash script that scans for CVE-2024-24919 by sending a crafted POST request to a target URL and checking for the presence of specific strings in the response. It does not exploit the vulnerability but detects potential exposure.
Classification
Scanner 90%
Target:
Check Point Security Gateway (specific version not specified)
No auth needed
Prerequisites:
A list of target URLs to scan
nomisec
WORKING POC
2 stars
by NingXin2002 · infoleak
https://github.com/NingXin2002/Check-Point_poc
This repository contains a functional exploit for CVE-2024-24919, a path traversal vulnerability in Check Point security gateways. The PoC sends a crafted POST request to '/clients/MyCRL' with a payload to read arbitrary files (e.g., '/etc/shadow').
Classification
Working Poc 95%
Target:
Check Point Security Gateway (versions affected by CVE-2024-24919)
No auth needed
Prerequisites:
Network access to the target Check Point gateway
github
WORKING POC
2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/CheckPoint_CVE-2024-24919
The repository contains functional exploit code for CVE-2024-24919, a local file inclusion vulnerability in Check Point Quantum Gateway. The YAML template and README provide clear technical details and a working PoC using a crafted POST request to disclose sensitive files like /etc/shadow.
Classification
Working Poc 95%
Target:
Check Point Quantum Security Gateway
No auth needed
Prerequisites:
Network access to the target · IPSec VPN, remote access VPN, or mobile access software blade configured
nomisec
SCANNER
2 stars
by Cappricio-Securities · infoleak
https://github.com/Cappricio-Securities/CVE-2024-24919
This repository contains a Python-based scanner for CVE-2024-24919, designed to detect potential vulnerabilities by sending crafted requests to target URLs and checking for specific responses (e.g., 'root:' in response text). It includes features like Telegram notifications and file-based input/output.
Classification
Scanner 90%
Target:
Unknown (scanner targets web applications)
No auth needed
Prerequisites:
Python3 · pip · target URLs
nomisec
WORKING POC
2 stars
by protonnegativo · infoleak
https://github.com/protonnegativo/CVE-2024-24919
The repository contains a functional exploit PoC for CVE-2024-24919, which includes a Shodan search script to identify potentially vulnerable targets and a PoC script to confirm vulnerability by attempting to read /etc/passwd via a path traversal attack.
Classification
Working Poc 95%
Target:
Unknown (likely a web application with a vulnerable endpoint at /clients/MyCRL)
No auth needed
Prerequisites:
Shodan API key for target discovery · List of target URLs
nomisec
WORKING POC
2 stars
by bigb0x · infoleak
https://github.com/bigb0x/CVE-2024-24919-Sniper
The repository contains a functional Python script that exploits CVE-2024-24919, an information disclosure vulnerability in Check Point Security Gateway. The script supports both single-target and bulk scanning with multithreading, and includes features for generating CSV reports and color-coded output.
Classification
Working Poc 95%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Network access to the target Check Point Security Gateway · Python 3.6+ environment with required dependencies
nomisec
WORKING POC
2 stars
by r4p3c4 · infoleak
https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN
The repository contains a functional exploit for CVE-2024-24919, targeting Checkpoint Firewall VPNs via a path traversal vulnerability to dump arbitrary files (default: /etc/passwd). The exploit uses asynchronous HTTP requests with aiohttp and supports proxying, threading, and output logging.
Classification
Working Poc 95%
Target:
Checkpoint Firewall VPN (version not specified)
No auth needed
Prerequisites:
Network access to the target VPN endpoint
nomisec
WORKING POC
1 stars
by voidbroker · poc
https://github.com/voidbroker/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, an information disclosure vulnerability in Check Point security products. The script sends crafted POST requests to the `/clients/MyCRL` endpoint to read sensitive files via directory traversal.
Classification
Working Poc 95%
Target:
Check Point Quantum Security Gateways, CloudGuard
No auth needed
Prerequisites:
Network access to the target device · Target running vulnerable Check Point software
nomisec
WORKING POC
1 stars
by funixone · infoleak
https://github.com/funixone/CVE-2024-24919---Exploit-Script
This repository contains a functional Python script that exploits CVE-2024-24919, a path traversal vulnerability in Check Point Security Gateway, allowing unauthorized access to sensitive files like /etc/shadow. The script sends crafted HTTP requests to vulnerable endpoints and checks for specific markers in the response to confirm exploitation.
Classification
Working Poc 90%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Python 3.x · requests library · colorama library · list of target URLs
nomisec
WRITEUP
1 stars
by hashdr1ft · infoleak
https://github.com/hashdr1ft/SOC_287
This repository provides a detailed walkthrough of CVE-2024-24919, an arbitrary file read vulnerability in Check Point Security Gateways. It includes an analysis of the attack scenario, detection methods, and mitigation strategies, but does not contain functional exploit code.
Classification
Writeup 95%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Access to the target system's web interface · Knowledge of directory traversal techniques
nomisec
SCANNER
1 stars
by 0xans · poc
https://github.com/0xans/CVE-2024-24919
The repository contains a Python script designed to scan for potential CVE-2024-24919 vulnerabilities by sending a POST request to the '/clients/MyCRL' endpoint and checking for the presence of 'root' in the response. It does not include exploit code but serves as a detection tool.
Classification
Scanner 90%
Target:
Unknown (likely a web application with a specific endpoint)
No auth needed
Prerequisites:
Network access to the target web application
nomisec
SCANNER
1 stars
by SalehLardhi · infoleak
https://github.com/SalehLardhi/CVE-2024-24919
The repository contains a Nuclei template designed to detect CVE-2024-24919, a local file inclusion vulnerability in Check Point SVN Foundation that allows attackers to read the `/etc/shadow` file. The template sends a crafted POST request to exploit the path traversal and checks for the presence of the `root:*:` pattern in the response.
Classification
Scanner 95%
Target:
Check Point SVN Foundation
No auth needed
Prerequisites:
Network access to the target system · Check Point SVN Foundation running on the target
nomisec
WORKING POC
1 stars
by starlox0 · infoleak
https://github.com/starlox0/CVE-2024-24919-POC
The repository contains a functional bash script that automates the exploitation of CVE-2024-24919, a local file inclusion (LFI) vulnerability in Check Point Security Gateway. The script sends a crafted POST request to the '/clients/MyCRL' endpoint to retrieve sensitive files like '/etc/passwd'.
Classification
Working Poc 95%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Target URL or list of URLs in a file
nomisec
SCANNER
1 stars
by birdlex · poc
https://github.com/birdlex/cve-2024-24919-checker
This repository contains a bash script that checks for the presence of CVE-2024-24919 in Check Point VPN systems by verifying version, patch status, and configuration details. It does not exploit the vulnerability but provides patch download links based on the detected version.
Classification
Scanner 95%
Target:
Check Point VPN (various versions including R81.20, R81.10, R81, R80.40, R80.30, R80.20)
Auth required
Prerequisites:
Access to the target system with sufficient privileges to run commands like 'cpinfo', 'vpn cccd status', and 'enabled_blades'
nomisec
WORKING POC
1 stars
by Praison001 · infoleak
https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN
This repository contains a functional exploit for CVE-2024-24919, an unauthenticated arbitrary file read vulnerability in Check Point Remote Access VPN. The exploit leverages a path traversal vulnerability to read sensitive files like /etc/passwd, /etc/shadow, and SSH keys, potentially leading to full system compromise.
Classification
Working Poc 95%
Target:
Check Point Remote Access VPN (CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Spark Appliances) versions R77.20 to R81.20
No auth needed
Prerequisites:
Network access to the target system · Target system must be running a vulnerable version of Check Point Remote Access VPN
nomisec
SCANNER
1 stars
by mr-kasim-mehar · infoleak
https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit
This Java tool scans for CVE-2024-24919 by sending crafted HTTP POST requests to check for path traversal vulnerabilities. It does not execute arbitrary commands or achieve remote code execution, but confirms vulnerability by reading sensitive files like /etc/passwd.
Classification
Scanner 90%
Target:
Unknown (likely a web server or application with path traversal vulnerability)
No auth needed
Prerequisites:
List of target IPs in 'domain-IP.txt' · Network access to target hosts
nomisec
WORKING POC
1 stars
by 0xYumeko · infoleak
https://github.com/0xYumeko/CVE-2024-24919
This repository contains a functional exploit for CVE-2024-24919, an information disclosure vulnerability in Check Point Quantum Gateway. The exploit leverages a path traversal flaw to access sensitive files like /etc/shadow via a crafted POST request to the /clients/MyCRL endpoint.
Classification
Working Poc 95%
Target:
Check Point Quantum Security Gateway
No auth needed
Prerequisites:
Target must have IPSec VPN, remote access VPN, or mobile access software blade configured
nomisec
SCANNER
1 stars
by r4p3c4 · infoleak
https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check
The repository contains a Python script that checks for the presence of CVE-2024-24919 in Checkpoint Firewall VPNs by sending a crafted HTTP request to read the /etc/passwd file. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 90%
Target:
Checkpoint Firewall VPN
No auth needed
Prerequisites:
Network access to the target Checkpoint Firewall VPN
nomisec
WORKING POC
1 stars
by fernandobortotti · infoleak
https://github.com/fernandobortotti/CVE-2024-24919
This repository contains a functional exploit for CVE-2024-24919, targeting Check Point SSL Network Extender. It includes a script to gather vulnerable IPs via Hunter API and another to perform directory brute-forcing via a crafted POST request to '/clients/MyCRL'.
Classification
Working Poc 90%
Target:
Check Point SSL Network Extender
No auth needed
Prerequisites:
Hunter API key for IP collection · List of target IPs · Wordlist for directory brute-forcing
nomisec
WORKING POC
1 stars
by nexblade12 · infoleak
https://github.com/nexblade12/CVE-2024-24919
This repository contains a functional exploit for CVE-2024-24919, a path traversal vulnerability in Check Point Quantum Security Gateways. The YAML file includes a crafted HTTP POST request to leak the contents of /etc/passwd, demonstrating the vulnerability.
Classification
Working Poc 95%
Target:
Check Point Quantum Security Gateways
No auth needed
Prerequisites:
Network access to the target system
nomisec
WORKING POC
1 stars
by satriarizka · infoleak
https://github.com/satriarizka/CVE-2024-24919
The repository contains a functional exploit for CVE-2024-24919, targeting Check Point SSL Network Extender. It includes a bash script for scanning multiple IPs and a Python script for exploiting the path traversal vulnerability to read arbitrary files (e.g., /etc/passwd).
Classification
Working Poc 95%
Target:
Check Point SSL Network Extender
No auth needed
Prerequisites:
Network access to the target · Target running vulnerable Check Point SSL Network Extender
gitlab
SCANNER
by x86dx2 · infoleak
https://gitlab.com/x86dx2/cve-2024-24919-checking
The repository contains a Python script that scans for CVE-2024-24919 by sending crafted HTTP POST requests to target IPs and checking for vulnerability status. It does not exploit the vulnerability but detects its presence.
Classification
Scanner 95%
Target:
Check Point Security Gateway (specific version not specified)
No auth needed
Prerequisites:
Python 3.x · requests library · colorama library · urllib3 library
nomisec
WRITEUP
by MacUchegit · infoleak
https://github.com/MacUchegit/Detecting-and-Analyzing-CVE-2024-24919-Exploitation
This repository provides a detailed technical analysis of CVE-2024-24919, a path traversal vulnerability in Check Point Security Gateways. It includes log analysis, IOC documentation, and containment steps but does not contain functional exploit code.
Classification
Writeup 100%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Access to vulnerable Check Point Security Gateway endpoint
nomisec
WRITEUP
by CyberBibs · poc
https://github.com/CyberBibs/Event-ID-263-Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-
This repository provides a detailed technical analysis and incident response walkthrough for CVE-2024-24919, an arbitrary file read vulnerability in Check Point Security Gateways. It includes steps for detection, analysis, containment, and remediation, along with IOCs and log analysis.
Classification
Writeup 100%
Target:
Check Point Security Gateway with Remote Access VPN or Mobile Access Blade enabled
No auth needed
Prerequisites:
Network access to vulnerable Check Point Security Gateway · Remote Access VPN or Mobile Access Blade enabled
nomisec
WRITEUP
by CyprianAtsyor · infoleak
https://github.com/CyprianAtsyor/CVE-2024-24919-Incident-Report.md
This repository contains a detailed incident report and technical analysis of CVE-2024-24919, an arbitrary file read vulnerability in Check Point Security Gateway. It includes forensic details, exploit payloads, and response actions but does not provide functional exploit code.
Classification
Writeup 90%
Target:
Check Point Security Gateway
No auth needed
Prerequisites:
Network access to vulnerable Check Point Security Gateway · Knowledge of path traversal techniques
nomisec
WRITEUP
by LuisMateo1 · infoleak
https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919
This repository provides a detailed technical analysis of CVE-2024-24919, a path traversal vulnerability, including investigation steps, log analysis, and threat intelligence correlation. It does not contain exploit code but offers a thorough walkthrough of the attack scenario.
Classification
Writeup 90%
Target:
Unspecified (likely a web server or application vulnerable to path traversal)
No auth needed
Prerequisites:
Access to the vulnerable server · Knowledge of the target file paths (e.g., /etc/passwd, /etc/shadow)
nomisec
WORKING POC
by SpiX-7 · poc
https://github.com/SpiX-7/CVE-2024-24919-POC
The repository contains a functional bash script that automates the exploitation of CVE-2024-24919, a local file inclusion (LFI) vulnerability in Checkpoint Security Gateway. The script sends a crafted POST request to the '/clients/MyCRL' endpoint to retrieve sensitive files like '/etc/passwd'.
Classification
Working Poc 95%
Target:
Checkpoint Security Gateway
No auth needed
Prerequisites:
Target URL or list of URLs
nomisec
WORKING POC
by sar-3mar · infoleak
https://github.com/sar-3mar/CVE-2024-24919_POC
This repository provides a functional proof-of-concept for CVE-2024-24919, a path traversal vulnerability in Check Point security gateways leading to information disclosure. The PoC includes a curl command to exploit the vulnerability and retrieve the /etc/shadow file.
Classification
Working Poc 90%
Target:
Check Point security gateway
No auth needed
Prerequisites:
Access to the target Check Point security gateway · Network connectivity to the target
nomisec
WORKING POC
by Jutrm · poc
https://github.com/Jutrm/cve-2024-24919
This repository contains a functional exploit for CVE-2024-24919, demonstrating a path traversal vulnerability via a POST request to '/clients/MyCRL' with a crafted payload to read '/etc/passwd'. The exploit is wrapped in an Electron application for ease of use.
Classification
Working Poc 90%
Target:
Unknown (likely a web application with a vulnerable endpoint)
No auth needed
Prerequisites:
Network access to the vulnerable endpoint
nomisec
WORKING POC
by H3KEY · infoleak
https://github.com/H3KEY/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, a Local File Inclusion (LFI) vulnerability in Check Point software. The script sends crafted HTTP POST requests to read critical system files by traversing directories.
Classification
Working Poc 95%
Target:
Check Point (version not specified)
No auth needed
Prerequisites:
Network access to the target · Target running vulnerable Check Point software
nomisec
SCANNER
by satchhacker · infoleak
https://github.com/satchhacker/cve-2024-24919
The repository contains a bash script that scans for CVE-2024-24919 by sending a crafted POST request to a target domain and checking for a 200 HTTP status code. It does not include exploit code for achieving remote code execution or other offensive actions.
Classification
Scanner 90%
Target:
Check Point Security Gateway (specific version not specified)
No auth needed
Prerequisites:
List of target domains/IPs in a file
nomisec
WORKING POC
by nullcult · infoleak
https://github.com/nullcult/CVE-2024-24919-Exploit
This Go-based exploit targets CVE-2024-24919, a path traversal vulnerability in Check Point Security Gateway. It sends crafted POST requests to '/clients/MyCRL' to read arbitrary files from the system, including sensitive files like '/etc/passwd' and configuration files.
Classification
Working Poc 95%
Target:
Check Point Security Gateway (versions affected by CVE-2024-24919)
No auth needed
Prerequisites:
Network access to the target host · TLS/HTTPS connectivity to the target
nomisec
WORKING POC
by Tim-Hoekstra · infoleak
https://github.com/Tim-Hoekstra/CVE-2024-24919
This repository contains a functional exploit for CVE-2024-24919, which leverages a path traversal vulnerability to read arbitrary files from the target system. The exploit sends crafted HTTP POST requests to the '/clients/MyCRL' endpoint with malicious paths to access sensitive files like '/etc/passwd' and '/etc/shadow'.
Classification
Working Poc 95%
Target:
Check Point Security Gateway (specific version not specified)
No auth needed
Prerequisites:
Target IP addresses or hostnames · Network access to the vulnerable endpoint
nomisec
SUSPICIOUS
by Expl0itD0g · poc
https://github.com/Expl0itD0g/CVE-2024-24919---Poc
The repository lacks actual exploit code and instead provides a Nuclei template link and Shodan dork. It contains no technical details about the vulnerability or functional PoC code.
Classification
Suspicious 90%
Target:
Check Point Security Gateways with remote Access VPN or Mobile Access Software Blades
No auth needed
Prerequisites:
Target must be a Check Point Security Gateway with remote Access VPN or Mobile Access Software Blades enabled
nomisec
WORKING POC
by J4F9S5D2Q7 · infoleak
https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT
This repository contains a functional exploit for CVE-2024-24919, targeting Check Point Security Gateways with remote Access VPN or Mobile Access Software Blades. The exploit leverages a path traversal vulnerability to read sensitive files like /etc/passwd, /etc/shadow, and log files.
Classification
Working Poc 95%
Target:
Check Point Security Gateways with remote Access VPN or Mobile Access Software Blades
No auth needed
Prerequisites:
Target must have remote Access VPN or Mobile Access Software Blades enabled · Target must be connected to the internet
nomisec
SCANNER
by YN1337 · infoleak
https://github.com/YN1337/CVE-2024-24919
The repository contains a Python script designed to scan multiple URLs for CVE-2024-24919, a vulnerability in Check Point firewalls. It sends a crafted POST request to extract files (e.g., /etc/passwd) but does not include exploit code for remote code execution or further exploitation.
Classification
Scanner 90%
Target:
Check Point firewalls (version not specified)
No auth needed
Prerequisites:
List of target URLs in a text file · Network access to target systems
nomisec
WORKING POC
by 0xkalawy · poc
https://github.com/0xkalawy/CVE-2024-24919
This repository contains a functional Python exploit for CVE-024-24919, targeting a path traversal vulnerability in Check Point products via the `/clients/MyCRL` endpoint. The exploit sends a crafted POST request to read arbitrary files (default: `/etc/passwd`) from vulnerable systems.
Classification
Working Poc 95%
Target:
Check Point Products (CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Spark Appliances) Versions: R77.20 (EOL), R77.30 (EOL), R80.10 (EOL), R80.20 (EOL), R80.20.x, R80.20SP (EOL), R80.30 (EOL), R80.30SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, R81.20
No auth needed
Prerequisites:
Network access to the vulnerable endpoint · Target system running an affected version of Check Point software
nomisec
WORKING POC
by Vulnpire · infoleak
https://github.com/Vulnpire/CVE-2024-24919
The repository contains a functional Python exploit for CVE-2024-24919, targeting a path traversal vulnerability in Check Point SSL Network Extender. The script sends a crafted POST request to read arbitrary files (e.g., /etc/passwd) via a directory traversal payload.
Classification
Working Poc 95%
Target:
Check Point SSL Network Extender
No auth needed
Prerequisites:
Network access to the target · Target running vulnerable Check Point SSL Network Extender
nomisec
WORKING POC
by P3wc0 · infoleak
https://github.com/P3wc0/CVE-2024-24919
This repository contains a functional exploit script for CVE-2024-24919, which appears to be a path traversal vulnerability. The script sends a crafted POST request to a target endpoint to read arbitrary files, defaulting to /etc/passwd.
Classification
Working Poc 95%
Target:
Unknown (likely a web application with a vulnerable endpoint at /clients/MyCRL)
No auth needed
Prerequisites:
Target IP or list of IPs · Network access to the vulnerable endpoint
nomisec
SCANNER
by am-eid · infoleak
https://github.com/am-eid/CVE-2024-24919
This repository contains a bash script designed to check for the presence of CVE-2024-24919. The script takes a list of IPs as input and scans them for vulnerability, but does not include exploit code.
Classification
Scanner 90%
Target:
Unknown (CVE-2024-24919)
No auth needed
Prerequisites:
List of target IPs
nomisec
WORKING POC
by hendprw · infoleak
https://github.com/hendprw/CVE-2024-24919
This YAML file contains a functional exploit for CVE-2024-24919, demonstrating a path traversal and local file inclusion (LFI) vulnerability. The exploit sends a crafted POST request to '/clients/MyCRL' with a payload designed to traverse directories and access '/etc/shadow'.
Classification
Working Poc 90%
Target:
Unknown (likely a web application with a vulnerable endpoint)
No auth needed
Prerequisites:
Network access to the target web application
vulncheck_xdb
WORKING POC
infoleak
https://github.com/spider00009/CVE-2024-24919-POC
The repository contains a functional bash script that automates the exploitation of CVE-2024-24919, a local file inclusion (LFI) vulnerability in Checkpoint Security Gateway. The script sends a crafted POST request to the '/clients/MyCRL' endpoint with a path traversal payload to retrieve '/etc/passwd'.
Classification
Working Poc 95%
Target:
Checkpoint Security Gateway
No auth needed
Prerequisites:
target URL or list of URLs
vulncheck_xdb
WORKING POC
infoleak
https://github.com/zxcod3/CVE-2024-24919
The repository contains a functional Python script that exploits CVE-2024-24919, an information disclosure vulnerability in Check Point security products. The script sends crafted POST requests to the `/clients/MyCRL` endpoint to read sensitive files via directory traversal.
Classification
Working Poc 95%
Target:
Check Point Quantum Security Gateways and CloudGuard
No auth needed
Prerequisites:
network access to the target · vulnerable endpoint exposed
vulncheck_xdb
WORKING POC
infoleak
https://github.com/theeldruin/CVE-PoCs
The repository contains a functional exploit script for CVE-2024-24919, targeting Check Point software via a path traversal vulnerability in the '/clients/MyCRL' endpoint. The script sends crafted POST requests to leak sensitive files (e.g., /etc/passwd) by manipulating the 'Content-Length' header and payload.
Classification
Working Poc 95%
Target:
Check Point (version not specified)
No auth needed
Prerequisites:
network access to target · vulnerable Check Point endpoint
vulncheck_xdb
WORKING POC
infoleak
https://github.com/M3mby7e/exploits
The repository contains a functional bash script that exploits a path traversal vulnerability in Check Point devices (CVE-2024-24919) to read arbitrary files. The script sends a crafted POST request to the target endpoint to retrieve sensitive files like /etc/passwd or /etc/shadow.
Classification
Working Poc 95%
Target:
Check Point devices (specific version not specified)
No auth needed
Prerequisites:
target IP/port · vulnerable Check Point device