7.5
HIGH

CVE-2018-18619

Published: 29/11/2018 Updated: 28/12/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9

Vulnerability Summary

Advanced Comment System SQL injection

internal/advanced_comment_system/admin.php in Advanced Comment System 1.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query, allowing remote attackers to execute the sqli attack via a URL in the "page" parameter. NOTE: The product is discontinued.

Advanced Comment System is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the admin.php script using the 'page' parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Complexity: LOW
Authentication: NONE
Access Vector: NETWORK
Confidentiality Impact: PARTIAL
Integrity Impact: PARTIAL
Availability Impact: PARTIAL

Vulnerability Trend

Affected Products

Exploits

# Exploit Title: SQL injection in Advanced comment system v10 # Date: 29-10-2018 # Exploit Author: Rafael Pedrero # Vendor Homepage: wwwplohnicom # Software Link: wwwplohnicom/wb/content/php/download/Advanced_comment_system_1-0zip, webarchiveorg/web/20120214173003/wwwplohnicom/wb/content/php/download/Advanced_ ...

Mailing Lists

Advanced Comment System version 10 suffers from a remote SQL injection vulnerability ...
Some time ago I discovered some vulnerabilities and did not report them over 2003 to 2010, the time came, better late than never :-D <!-- # Exploit Title: SQL injection in Advanced comment system v10 # Date: 29-10-2018 # Exploit Author: Rafael Pedrero # Vendor Homepage: wwwplohnicom # Software Link: wwwplohnicom/wb/content/ph ...

References