Update GobyVuls-Document.md

This commit is contained in:
Goby 2024-05-30 18:46:15 +08:00 committed by GitHub
parent d926a3cf0e
commit dbe3b06c62
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -2,7 +2,21 @@
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing. The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
**Updated document date: May 23, 2024** **Updated document date: May 30, 2024**
## CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919)
| **Vulnerability** | CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919) |
| :----: | :-----|
| **Chinese name** | CheckPoint Gateway /clients/MyCRL 文件读取漏洞CVE-2024-24919 |
| **CVSS core** | 7.5 |
| **FOFA Query** (click to view the results directly)| [ app="Check_Point-SSL-Extender"](https://en.fofa.info/result?qbase64=Ym9keT0iL25leHVzLSIgJiYgYm9keT0iUmVwb3NpdG9yeSI%3D)|
| **Number of assets affected** | 77631 |
| **Description** | CheckPoint Gateway is a network security device developed by CheckPoint Software Technology Company, which is mainly used to protect network infrastructure from various network threats.There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
| **Impact** | There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
![](https://s3.bmp.ovh/imgs/2024/05/30/3d61c449449138c0.gif)
## Sonatype Nexus Repository Manager File Read Vulnerability(CVE-2024-4956) ## Sonatype Nexus Repository Manager File Read Vulnerability(CVE-2024-4956)