First published: Mon May 28 2001(Updated: )
TWIG 2.6.2 and earlier allows remote attackers to perform unauthorized database operations via a SQL injection attack on the id parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Twig | =2.2 | |
Twig | =2.5.1 | |
Twig | =2.3.1 | |
Twig | =2.0.3 | |
Twig | =2.3 | |
Twig | =2.6 | |
Twig | =2.0.1 | |
Twig | =2.4 | |
Twig | =2.2.2 | |
Twig | =2.1 | |
Twig | =2.5 | |
Twig | =2.0_beta1 | |
Twig | =2.0.2 | |
Twig | =2.3.2 | |
Twig | =2.0_beta2 | |
Twig | =2.0_beta3 | |
Twig | =2.1.1 | |
Twig | =2.6.1 | |
Twig | =2.2.3 | |
Twig | =2.0 | |
Twig | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1348 is considered a high severity vulnerability due to its potential for remote SQL injection attacks.
To fix CVE-2001-1348, you should upgrade to at least version 2.6.3 of Twig which addresses this SQL injection vulnerability.
CVE-2001-1348 affects all versions of Twig prior to 2.6.3, including 2.2, 2.3, 2.4, 2.5, and 2.6.
A SQL injection attack in the context of CVE-2001-1348 allows attackers to manipulate database queries through unvalidated input in the id parameter.
Web applications using vulnerable versions of Twig are at risk of unauthorized database operations due to CVE-2001-1348.