
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Mocodo Mocodo Online 4.2.6 and below contains a Remote Code Execution vulnerability via /web/rewrite.php. The vulnerability was discovered and disclosed on May 9, 2024, affecting the web-based database schema design tool (Chocapikk Blog, NVD).
The vulnerability exists in the /web/rewrite.php file where user input from $POST['args'] is directly concatenated into a command string without proper sanitization. The application determines the path to the Mocodo executable based on the HTTPREFERER header and then constructs a command line using unsanitized user input. This implementation has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability allows an attacker to execute arbitrary commands on the server hosting the Mocodo application. Due to the lack of input validation and command sanitization, an attacker can achieve remote code execution with the same privileges as the web server process (Chocapikk Blog).
The vulnerability has been fixed in version 4.2.7 of Mocodo. For those unable to upgrade immediately, it is recommended to implement strict input validation and use PHP's escapeshellarg() function to properly escape command arguments. Additionally, implementing proper validation of user inputs before they are used in system commands is crucial (Chocapikk Blog).
The Mocodo development team responded promptly to the vulnerability report on May 9, 2024, acknowledging the security issue and releasing a fix in version 4.2.7 on the same day (Chocapikk Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”