CVE-2024-35374: Mocodo vulnerable to SQL injection in `/web/generate.php`
Mocodo Mocodo Online 4.2.6 and below does not properly sanitize the sql_case
input field in /web/generate.php
, allowing remote attackers to execute arbitrary SQL commands and potentially command injection, leading to remote code execution (RCE) under certain conditions.
References
- chocapikk.com/posts/2024/mocodo-vulnerabilities
- github.com/advisories/GHSA-j6cv-98jx-mrwr
- github.com/laowantong/mocodo
- github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/generate.php
- github.com/laowantong/mocodo/commit/f9368df28518b6c4a92fd207c260f1978ec34d6e
- nvd.nist.gov/vuln/detail/CVE-2024-35374
Detect and mitigate CVE-2024-35374 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →