Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-4623 PoC — Plohni Advanced Comment System 代码注入漏洞

Source
Associated Vulnerability
Title:Plohni Advanced Comment System 代码注入漏洞 (CVE-2009-4623)
Description:Plohni Advanced Comment System是Plohni个人开发者的一套评论系统。 Plohni Advanced Comment System 1.0 存在代码注入漏洞,该漏洞允许远程攻击者可利用该漏洞通过advanced_comment_system/的index.php and admin.php ACS_path参数执行任意PHP代码。
Description
Remote shell on CVE-2009-4623
Readme
# CVE-2009-4623
Remote shell on CVE-2009-4623:

Get a non-interactive shell, open another shell for an advanced use !!!  
usage: CVE-2009-4623.sh [hostname_and_Path]  
example: CVE-2009-4623.sh http://192.168.1.24/advanced_comment_system/admin.php  
options:  
        -h	this cruft
 
File Snapshot

[4.0K] /data/pocs/752567a2520794215afa806653e15454c361db58 ├── [1.7K] CVE-2009-4623.sh └── [ 285] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.