Mocodo Mocodo Online 4.2.6 and below is vulnerable to Remote Code Execution via /web/rewrite.php.
References
Link | Resource |
---|---|
https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45 | Product |
https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45 | Product |
Configurations
History
10 Jun 2025, 17:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mocodo:mocodo_online:*:*:*:*:*:*:*:* | |
First Time |
Mocodo
Mocodo mocodo Online |
|
References | () https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45 - Product |
Information
Published : 2024-05-24 21:15
Updated : 2025-06-10 17:25
NVD link : CVE-2024-35373
Mitre link : CVE-2024-35373
CVE.ORG link : CVE-2024-35373
JSON object : View
Products Affected
mocodo
- mocodo_online
CWE
CWE-75
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)