The provided text describes an SQL injection vulnerability in Cyber CMS, where unsanitized user input in the 'id' parameter of faq.php can be exploited to manipulate SQL queries. No actual exploit code is present, only a description and example URL.
Classification
Writeup 80%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target:Cyber CMS (version unspecified)
No auth needed
Prerequisites:Access to the vulnerable faq.php endpoint