Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48463: n/a

0
Medium
VulnerabilityCVE-2024-48463cvecve-2024-48463
Published: Mon Nov 04 2024 (11/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Bruno before 1.29.1 uses Electron shell.openExternal without validation (of http or https) for opening windows within the Markdown docs viewer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:30:42 UTC

Technical Analysis

CVE-2024-48463 is a vulnerability identified in the Bruno application prior to version 1.29.1, specifically related to its use of Electron's shell.openExternal API within the Markdown document viewer component. Electron's shell.openExternal is designed to open external URLs in the user's default browser. However, in affected versions, Bruno fails to validate whether the URLs passed to this function are legitimate http or https links. This lack of validation corresponds to CWE-601, an Open Redirect vulnerability, which can be exploited by attackers to craft malicious links embedded in Markdown documents. When a user clicks such a link, the application opens an external URL without verifying its safety, potentially redirecting users to phishing sites or malicious web pages. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on integrity, as attackers can manipulate the destination of links to deceive users. There is no impact on confidentiality or availability. No patches or exploits are currently publicly available, but the issue is recognized and Bruno 1.29.1 addresses this by implementing proper URL validation before invoking shell.openExternal.

Potential Impact

The vulnerability primarily threatens the integrity of user interactions within the Bruno application by enabling attackers to redirect users to malicious external websites through crafted Markdown documents. This can facilitate phishing attacks, social engineering, or delivery of malware via malicious URLs. Since exploitation requires user interaction (clicking a link), the risk depends on user behavior and awareness. There is no direct impact on confidentiality or availability of the application or underlying systems. However, successful exploitation could lead to compromised user credentials or system compromise if users are tricked into visiting harmful sites. Organizations relying on Bruno for Markdown document viewing or editing may face increased risk of targeted phishing campaigns or supply chain attacks if attackers embed malicious links in shared documents. The medium severity score reflects these moderate but significant risks.

Mitigation Recommendations

To mitigate CVE-2024-48463, organizations should immediately update Bruno to version 1.29.1 or later, where proper URL validation is implemented before calling shell.openExternal. If updating is not immediately feasible, apply the following mitigations: implement strict input validation on URLs within Markdown documents to ensure only safe http or https links are allowed; disable or restrict the use of shell.openExternal for untrusted content; educate users to be cautious when clicking links in Markdown documents, especially from untrusted sources; consider sandboxing or running Bruno in a restricted environment to limit potential damage from malicious redirects; monitor network traffic for unusual outbound connections that may indicate exploitation attempts. Additionally, developers should review and harden any other uses of shell.openExternal or similar APIs to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b72b7ef31ef0b55580a

Added to database: 2/25/2026, 9:36:50 PM

Last enriched: 2/27/2026, 9:30:42 PM

Last updated: 4/12/2026, 5:07:14 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses