### [CVE-2009-4623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4623) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/MonsempesSamuel/CVE-2009-4623 - https://github.com/hupe1980/CVE-2009-4623 - https://github.com/iandrade87br/OSCP - https://github.com/kernel-cyber/CVE-2009-4623 - https://github.com/personaone/OSCP - https://github.com/promise2k/OSCP - https://github.com/xsudoxx/OSCP