CVE-2009-4623

Advanced Comment System 1.0 - RCE

Title source: llm
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598.

Exploits (4)

exploitdb WRITEUP VERIFIED
by Kurd-Team · textwebappsphp
https://www.exploit-db.com/exploits/9623
nomisec WORKING POC 1 stars
by kernel-cyber · poc
https://github.com/kernel-cyber/CVE-2009-4623
nomisec WORKING POC
by sammonsempes · poc
https://github.com/sammonsempes/CVE-2009-4623
nomisec WORKING POC
by hupe1980 · poc
https://github.com/hupe1980/CVE-2009-4623

References (2)

Core 2
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/36643
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9623

Scores

EPSS 0.0313
EPSS Percentile 86.9%

Details

CWE
CWE-94
Status published
Products (1)
plohni/advanced_comment_system 1.0
Published Jan 18, 2010
Tracked Since Feb 18, 2026