### 简要描述: ### 详细说明: 新云cms建站系统存在ewebeditor上传和iis解析漏洞,可批量getshell. 利用ewebeditor上传漏洞可以新建一个1.asp的文件夹,再配合iis的解析漏洞就可以成功的拿到shell. 可通过谷歌获得大量的漏洞网站,关键字如下: inurl:Showservices.asp?id= inurl:showkbxx.asp?id= ``` None ``` [<img src="https://images.seebug.org/upload/201409/241516151fa13bf11ce8779a280081498582d80d.jpg" alt="QQ图片20140924145219.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/241516151fa13bf11ce8779a280081498582d80d.jpg) [<img src="https://images.seebug.org/upload/201409/24151624de2ebf7ea76aa968e66ec4e2192c8199.jpg" alt="QQ图片20140924145233.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24151624de2ebf7ea76aa968e66ec4e2192c8199.jpg) [<img src="https://images.seebug.org/upload/201409/241516332956f56eef9160b49863e79bf45a30ca.jpg" alt="QQ图片20140924145245.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/241516332956f56eef9160b49863e79bf45a30ca.jpg)
### 简要描述: ### 详细说明: 新云cms建站系统存在ewebeditor上传和iis解析漏洞,可批量getshell. 利用ewebeditor上传漏洞可以新建一个1.asp的文件夹,再配合iis的解析漏洞就可以成功的拿到shell. 可通过谷歌获得大量的漏洞网站,关键字如下: inurl:Showservices.asp?id= inurl:showkbxx.asp?id= ``` None ``` [<img src="https://images.seebug.org/upload/201409/241516151fa13bf11ce8779a280081498582d80d.jpg" alt="QQ图片20140924145219.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/241516151fa13bf11ce8779a280081498582d80d.jpg) [<img src="https://images.seebug.org/upload/201409/24151624de2ebf7ea76aa968e66ec4e2192c8199.jpg" alt="QQ图片20140924145233.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/24151624de2ebf7ea76aa968e66ec4e2192c8199.jpg) [<img src="https://images.seebug.org/upload/201409/241516332956f56eef9160b49863e79bf45a30ca.jpg" alt="QQ图片20140924145245.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201409/241516332956f56eef9160b49863e79bf45a30ca.jpg)