Safety vulnerability ID: 71899
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Mocodo are vulnerable to OS Command Injection. This vulnerability could result in remote code execution, potentially leading to unauthorized access to sensitive data or complete system compromise. The attack vector involves manipulating input fields in the web interface, particularly in generate.php and rewrite.php. Vulnerable areas include the construction of $basthon_options in generate.php and $command_line in rewrite.php. The vulnerability is exploitable by an attacker with access to the web interface. To remediate, update to Mocodo version 4.2.7 or later, which properly escapes user input using escapeshellarg(). This vulnerability primarily affects PHP-based deployments of Mocodo's online interface. The CWE classification is CWE-78: Improper Neutralization of Special Elements used in an OS Command.
Latest version: 4.2.12
Modélisation Conceptuelle de Données. Nickel. Ni souris.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application