Skip to content

Commit de3e929

Browse files
committed
automatic module_metadata_base.json update
1 parent 35d161b commit de3e929

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20283,6 +20283,67 @@
2028320283

2028420284
]
2028520285
},
20286+
"auxiliary_gather/checkpoint_gateway_fileread_cve_2024_24919": {
20287+
"name": "Check Point Security Gateway Arbitrary File Read",
20288+
"fullname": "auxiliary/gather/checkpoint_gateway_fileread_cve_2024_24919",
20289+
"aliases": [
20290+
20291+
],
20292+
"rank": 300,
20293+
"disclosure_date": null,
20294+
"type": "auxiliary",
20295+
"author": [
20296+
"remmons-r7"
20297+
],
20298+
"description": "This module leverages an unauthenticated arbitrary root file read vulnerability for\n Check Point Security Gateway appliances. When the IPSec VPN or Mobile Access blades\n are enabled on affected devices, traversal payloads can be used to read any files on\n the local file system. Password hashes read from disk may be cracked, potentially\n resulting in administrator-level access to the target device. This vulnerability is\n tracked as CVE-2024-24919.",
20299+
"references": [
20300+
"URL-https://support.checkpoint.com/results/sk/sk182336",
20301+
"URL-https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/",
20302+
"URL-https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/"
20303+
],
20304+
"platform": "",
20305+
"arch": "",
20306+
"rport": 443,
20307+
"autofilter_ports": [
20308+
80,
20309+
8080,
20310+
443,
20311+
8000,
20312+
8888,
20313+
8880,
20314+
8008,
20315+
3000,
20316+
8443
20317+
],
20318+
"autofilter_services": [
20319+
"http",
20320+
"https"
20321+
],
20322+
"targets": null,
20323+
"mod_time": "2024-06-13 08:14:35 +0000",
20324+
"path": "/modules/auxiliary/gather/checkpoint_gateway_fileread_cve_2024_24919.rb",
20325+
"is_install_path": true,
20326+
"ref_name": "gather/checkpoint_gateway_fileread_cve_2024_24919",
20327+
"check": true,
20328+
"post_auth": false,
20329+
"default_credential": false,
20330+
"notes": {
20331+
"Stability": [
20332+
"crash-safe"
20333+
],
20334+
"SideEffects": [
20335+
20336+
],
20337+
"Reliability": [
20338+
20339+
]
20340+
},
20341+
"session_types": false,
20342+
"needs_cleanup": false,
20343+
"actions": [
20344+
20345+
]
20346+
},
2028620347
"auxiliary_gather/checkpoint_hostname": {
2028720348
"name": "CheckPoint Firewall-1 SecuRemote Topology Service Hostname Disclosure",
2028820349
"fullname": "auxiliary/gather/checkpoint_hostname",

0 commit comments

Comments
 (0)