Skip to content

CVE-2024-24919 [Check Point Security Gateway Information Disclosure]

License

Notifications You must be signed in to change notification settings

serundengsapi/CVE-2024-24919-Bulk-Scanner

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-24919 Bulk Scanner

CVE-2024-24919 [Check Point Security Gateway Information Disclosure]

Script based on and the credit goes to: https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/

This Python script scans lisy of URLs for CVE-2024-24919 vulnerability by sending specific POST requests and checking the response headers and status code. It logs the request and response details and identifies vulnerable URLs based on predefined criteria.

image

Warning

Intended only for educational and testing in corporate environments. https://twitter.com/nav1n0x/ https://github.com/ifconfig-me takes no responsibility for the code, use at your own risk. Do not attack a target you don't have permission to engage with.

Features

  • Sends POST requests with payloads to specified URLs.
  • Checks the response headers and status line to determine vulnerabilities.
  • Logs full request and response details.
  • Outputs progress and results in the terminal.
  • Saves vulnerable URLs to a file.
  • Supports sequential scanning to ensure reliable request handling.

Requirements

  • Python 3.x
  • requests library
  • termcolor library

Installation

  1. Clone the repository:

    git clone https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner.git
    cd CVE-2024-24919-Bulk-Scanner
  2. Install the required libraries:

    pip install requests termcolor

Usage

  1. Prepare a file with the list of URLs:

    Create a text file (e.g., urls.txt) with one URL per line. Make sure each URL starts with https://. Example:

    https://example.com
    https://testsite.com
    https://vulnerable.com
    https://123.456.789.10:8080
    
  2. Run the script:

    python CVE-2024-24919-auto.py -f urls.txt
  3. Check the output:

    The script will print the scanning progress and results in the terminal. Vulnerable URLs will be identified with the message Vulnerable URL found:.

  4. Results:

    • Progress and results will be displayed in the terminal.
    • Request and response logs will be saved in request-analyze.txt.
    • Vulnerable URLs will be saved in checkpoint-results.txt.

Script Details

  • The script sends POST requests to the /clients/MyCRL endpoint of each URL with two payloads:

    • aCSHELL/../../../../../../../etc/passwd
    • aCSHELL/../../../../../../../etc/shadow
  • It checks the response headers for the following criteria:

    • Server: Check Point SVN foundation
    • X-UA-Compatible: IE=EmulateIE7
    • X-Frame-Options: SAMEORIGIN
    • Status line: HTTP/1.0 200 OK
  • If the response matches either of the three of the above criteria, the URL is considered vulnerable.

Example Output

image

About

CVE-2024-24919 [Check Point Security Gateway Information Disclosure]

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%