Skip to content

This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919

Notifications You must be signed in to change notification settings

un9nplayer/CVE-2024-24919

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

CVE-2024-24919 Exploit

Overview

This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919

Severity: Critical

Table of Contents

Usage

  1. Clone the repository:

    git clone https://github.com/un9nplayer/CVE-2024-24919.git
    cd CVE-2024-24919
  2. Target/IP must be in domain-IP.txt

    echo "[target/IP]" >> domain-IP.txt
  3. Run the exploit:

    python3 CVE-2024-24919.py 

POC Video

YouTube

About

This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages