### [CVE-2018-18619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18619) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description internal/advanced_comment_system/admin.php in Advanced Comment System 1.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query, allowing remote attackers to execute the sqli attack via a URL in the "page" parameter. NOTE: The product is discontinued. ### POC #### Reference - http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html - http://packetstormsecurity.com/files/150261/Advanced-Comment-System-1.0-SQL-Injection.html - http://seclists.org/fulldisclosure/2018/Nov/30 - http://seclists.org/fulldisclosure/2018/Nov/30 - https://www.exploit-db.com/exploits/45853/ - https://www.exploit-db.com/exploits/45853/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/iandrade87br/OSCP - https://github.com/personaone/OSCP - https://github.com/promise2k/OSCP - https://github.com/xsudoxx/OSCP