Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case input field in /web/generate.php, allowing remote attackers to execute arbitrary commands and potentially command injection, leading to remote code execution (RCE) under certain conditions.
References
Link | Resource |
---|---|
https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158 | Product |
https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158 | Product |
Configurations
History
10 Jun 2025, 17:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mocodo
Mocodo mocodo Online |
|
References | () https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php#L104-L158 - Product | |
CPE | cpe:2.3:a:mocodo:mocodo_online:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-24 21:15
Updated : 2025-06-10 17:24
NVD link : CVE-2024-35374
Mitre link : CVE-2024-35374
CVE.ORG link : CVE-2024-35374
JSON object : View
Products Affected
mocodo
- mocodo_online
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')