PyPi: Mocodo

CVE-2024-35374

Safety vulnerability ID: 71899

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 24, 2024 Updated at Nov 23, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of Mocodo are vulnerable to OS Command Injection. This vulnerability could result in remote code execution, potentially leading to unauthorized access to sensitive data or complete system compromise. The attack vector involves manipulating input fields in the web interface, particularly in generate.php and rewrite.php. Vulnerable areas include the construction of $basthon_options in generate.php and $command_line in rewrite.php. The vulnerability is exploitable by an attacker with access to the web interface. To remediate, update to Mocodo version 4.2.7 or later, which properly escapes user input using escapeshellarg(). This vulnerability primarily affects PHP-based deployments of Mocodo's online interface. The CWE classification is CWE-78: Improper Neutralization of Special Elements used in an OS Command.

Affected package

mocodo

Latest version: 4.2.12

Modélisation Conceptuelle de Données. Nickel. Ni souris.

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application