TWIG 2.6.2 and earlier allows remote attackers to perform unauthorized database operations via a SQL injection attack on the id parameter.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Twig | Twig_development_team | 2.0 (including) | 2.0 (including) |
Twig | Twig_development_team | 2.0.1 (including) | 2.0.1 (including) |
Twig | Twig_development_team | 2.0.2 (including) | 2.0.2 (including) |
Twig | Twig_development_team | 2.0.3 (including) | 2.0.3 (including) |
Twig | Twig_development_team | 2.0_beta1 (including) | 2.0_beta1 (including) |
Twig | Twig_development_team | 2.0_beta2 (including) | 2.0_beta2 (including) |
Twig | Twig_development_team | 2.0_beta3 (including) | 2.0_beta3 (including) |
Twig | Twig_development_team | 2.1 (including) | 2.1 (including) |
Twig | Twig_development_team | 2.1.1 (including) | 2.1.1 (including) |
Twig | Twig_development_team | 2.2 (including) | 2.2 (including) |
Twig | Twig_development_team | 2.2.1 (including) | 2.2.1 (including) |
Twig | Twig_development_team | 2.2.2 (including) | 2.2.2 (including) |
Twig | Twig_development_team | 2.2.3 (including) | 2.2.3 (including) |
Twig | Twig_development_team | 2.3 (including) | 2.3 (including) |
Twig | Twig_development_team | 2.3.1 (including) | 2.3.1 (including) |
Twig | Twig_development_team | 2.3.2 (including) | 2.3.2 (including) |
Twig | Twig_development_team | 2.4 (including) | 2.4 (including) |
Twig | Twig_development_team | 2.5 (including) | 2.5 (including) |
Twig | Twig_development_team | 2.5.1 (including) | 2.5.1 (including) |
Twig | Twig_development_team | 2.6 (including) | 2.6 (including) |
Twig | Twig_development_team | 2.6.1 (including) | 2.6.1 (including) |