The provided text describes an SQL injection vulnerability in 1024 CMS 2.1.1, where unsanitized user input in the 'p' parameter can be exploited to manipulate SQL queries. No actual exploit code is present, only a description and example URL.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target:1024 CMS 2.1.1
No auth needed
Prerequisites:Access to the vulnerable web application