2024-05-26 14:27:05 +02:00
### [CVE-2018-18619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18619)



### Description
internal/advanced_comment_system/admin.php in Advanced Comment System 1.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query, allowing remote attackers to execute the sqli attack via a URL in the "page" parameter. NOTE: The product is discontinued.
### POC
#### Reference
- http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html
2024-05-26 14:27:05 +02:00
- http://seclists.org/fulldisclosure/2018/Nov/30
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2018/Nov/30
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/45853/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/45853/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/iandrade87br/OSCP
- https://github.com/personaone/OSCP
- https://github.com/promise2k/OSCP
- https://github.com/xsudoxx/OSCP