GobyVuls/CheckPoint_Gateway_clients_MyCRL_File_Reading_Vulnerability(CVE-2024-24919).md

14 lines
1.2 KiB
Markdown
Raw Normal View History

## CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919)
| **Vulnerability** | CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919) |
| :----: | :-----|
| **Chinese name** | CheckPoint Gateway /clients/MyCRL 文件读取漏洞CVE-2024-24919 |
| **CVSS core** | 7.5 |
| **FOFA Query** (click to view the results directly)| [ app="Check_Point-SSL-Extender"](https://en.fofa.info/result?qbase64=Ym9keT0iL25leHVzLSIgJiYgYm9keT0iUmVwb3NpdG9yeSI%3D)|
| **Number of assets affected** | 77631 |
| **Description** | CheckPoint Gateway is a network security device developed by CheckPoint Software Technology Company, which is mainly used to protect network infrastructure from various network threats.There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
| **Impact** | There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
![](https://s3.bmp.ovh/imgs/2024/05/30/3d61c449449138c0.gif)