diff --git a/GobyVuls-Document.md b/GobyVuls-Document.md index 104366d..e004cf1 100644 --- a/GobyVuls-Document.md +++ b/GobyVuls-Document.md @@ -2,7 +2,21 @@ The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing. -**Updated document date: May 23, 2024** +**Updated document date: May 30, 2024** + +## CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919) + +| **Vulnerability** | CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919) | +| :----: | :-----| +| **Chinese name** | CheckPoint Gateway /clients/MyCRL 文件读取漏洞(CVE-2024-24919) | +| **CVSS core** | 7.5 | +| **FOFA Query** (click to view the results directly)| [ app="Check_Point-SSL-Extender"](https://en.fofa.info/result?qbase64=Ym9keT0iL25leHVzLSIgJiYgYm9keT0iUmVwb3NpdG9yeSI%3D)| +| **Number of assets affected** | 77631 | +| **Description** | CheckPoint Gateway is a network security device developed by CheckPoint Software Technology Company, which is mainly used to protect network infrastructure from various network threats.There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.| +| **Impact** | There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.| + +![](https://s3.bmp.ovh/imgs/2024/05/30/3d61c449449138c0.gif) + ## Sonatype Nexus Repository Manager File Read Vulnerability(CVE-2024-4956)