Description Preview
The vulnerability (CVE-2024-10919) affects didi Super-Jacoco 1.0 and is triggered by an unsafe handling of the uuid argument in the /cov/triggerUnitCover function. Exploitation can occur remotely, enabling an attacker to inject and execute OS commands on the vulnerable system. The issue is categorized under CWE-78 (OS Command Injection) and CWE-74 (Injection). The advisory describes the vulnerability as critical; however, common scoring across CVSS versions places the base impact as medium in several vectors (CVSS v3.1: 6.3, CVSS v3.0: 6.3, CVSS v4.0: 5.3, CVSS v2.0: 6.5). An exploit has been disclosed publicly, highlighting the real-world risk. Version 1.0 is identified as affected.
Overview
This CVE describes a command injection vulnerability in didi Super-Jacoco 1.0 arising from unsafe handling of the uuid parameter in the /cov/triggerUnitCover endpoint. The flaw permits remote exploitation, enabling an attacker to run arbitrary commands on the host, with potential impact depending on the privileges of the running process. The vulnerability is associated with OS command injection (CWE-78) and general injection (CWE-74), and public disclosures of the exploit indicate real-world risk.
Remediation
- Upgrade to a fixed version or apply vendor-provided patch for didi Super-Jacoco if a fix is released for the 1.0 line. If no patch is available, implement compensating controls and monitor for exploitation.
- Validate and sanitize all user-controlled inputs, especially the uuid parameter, on the server side. Avoid constructing shell commands from input; use safe APIs or parameterized calls.
- Implement strict input validation and allow-listing for expected uuid formats; reject unexpected patterns before they reach any command execution layer.
- Restrict access to the vulnerable endpoint (/cov/triggerUnitCover) with authentication, authorization checks, and network access controls (e.g., IP allowlists, firewall rules).
- Run the application with least-privilege privileges and separate the service account from highly sensitive system credentials.
- Deploy Web Application Firewall (WAF) rules or IDS signatures to detect and block command-injection payloads targeting this endpoint.
- Conduct testing in a controlled environment to verify that input validation and command execution paths are properly hardened before deploying to production.
- Monitor logs and implement alerting for suspicious payloads or anomalous command executions; if exploitation is detected, rotate credentials, investigate, and contain affected hosts.
References
- VDB-283315 | didi Super-Jacoco triggerUnitCover os command injection — https://vuldb.com/?id.283315
- VDB-283315 | CTI Indicators (IOB, IOC, TTP, IOA) — https://vuldb.com/?ctiid.283315
- Submit #432689 | didi super-jacoco 1.0 Command Injection — https://vuldb.com/?submit.432689
- GitHub issue: didi/super-jacoco/issues/49 — https://github.com/didi/super-jacoco/issues/49
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- Finance and InsuranceFinance and Insurance: Low
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- ManufacturingManufacturing: Low
- MiningMining: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Public AdministrationPublic Administration: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Retail TradeRetail Trade: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low

