Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, allowing remote attackers to execute arbitrary commands and potentially command injection, leading to remote code execution (RCE) under certain conditions.
References
| Link | Resource |
|---|---|
| https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
| https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158 | Product |
| https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
| https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158 | Product |
Configurations
History
No history.
Information
Published : 2024-05-24 21:15
Updated : 2025-06-10 17:24
NVD link : CVE-2024-35374
Mitre link : CVE-2024-35374
CVE.ORG link : CVE-2024-35374
JSON object : View
Products Affected
mocodo
- mocodo_online
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
