GobyVuls/CheckPoint_Gateway_clients_MyCRL_File_Reading_Vulnerability(CVE-2024-24919).md

14 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

## CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919)
| **Vulnerability** | CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919) |
| :----: | :-----|
| **Chinese name** | CheckPoint Gateway /clients/MyCRL 文件读取漏洞CVE-2024-24919 |
| **CVSS core** | 7.5 |
| **FOFA Query** (click to view the results directly)| [ app="Check_Point-SSL-Extender"](https://en.fofa.info/result?qbase64=Ym9keT0iL25leHVzLSIgJiYgYm9keT0iUmVwb3NpdG9yeSI%3D)|
| **Number of assets affected** | 77631 |
| **Description** | CheckPoint Gateway is a network security device developed by CheckPoint Software Technology Company, which is mainly used to protect network infrastructure from various network threats.There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
| **Impact** | There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
![](https://s3.bmp.ovh/imgs/2024/05/30/3d61c449449138c0.gif)