CVE-2023-46116
📋 TL;DR
Tutanota (Tuta Mail) email client versions before 3.118.12 fail to properly validate URL schemes when opening links from emails. This allows attackers to craft malicious emails containing ftp:, smb:, or other dangerous URL schemes that can execute arbitrary code on the victim's computer when clicked. All Tutanota desktop users running vulnerable versions are affected.
💻 Affected Systems
- Tutanota (Tuta Mail) desktop client
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with full system compromise, allowing attacker to install malware, steal data, or pivot to other systems.
Likely Case
Targeted phishing campaigns delivering malware or ransomware via crafted email links.
If Mitigated
No impact if patched version is used or if users avoid clicking suspicious links.
🎯 Exploit Status
Exploitation requires user to click a malicious link in an email. Proof-of-concept video demonstrates the attack.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.118.12
Vendor Advisory: https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644
Restart Required: Yes
Instructions:
1. Open Tutanota desktop application. 2. Check for updates in settings or about menu. 3. Download and install version 3.118.12 or later. 4. Restart the application.
🔧 Temporary Workarounds
Disable external link opening
allConfigure Tutanota to not open links in external applications
Not applicable - configure in application settings
Use web or mobile version
allSwitch to Tutanota web interface or mobile apps which are not affected
🧯 If You Can't Patch
- Implement email filtering to block emails with suspicious URL schemes
- Train users to never click links in unsolicited emails
🔍 How to Verify
Check if Vulnerable:
Check Tutanota version in Help > About menu. If version is below 3.118.12, you are vulnerable.
Check Version:
Not applicable - check via application GUI
Verify Fix Applied:
After updating, verify version is 3.118.12 or higher in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Process execution from Tutanota with unusual parameters
- Network connections to unusual protocols (ftp, smb) initiated by Tutanota
Network Indicators:
- Outbound connections to FTP or SMB servers from user workstations running Tutanota
SIEM Query:
process_name:"Tutanota.exe" AND (cmdline:*ftp* OR cmdline:*smb* OR cmdline:*://*)
🔗 References
- https://github.com/tutao/tutanota/blob/master/src/desktop/ApplicationWindow.ts#L417
- https://github.com/tutao/tutanota/blob/master/src/desktop/ApplicationWindow.ts#L423
- https://github.com/tutao/tutanota/commit/88ecad17d00d05a722399aed35f0d280899d55a2
- https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644
- https://user-images.githubusercontent.com/46137338/270564886-7a0389d3-f9ef-44e1-9f5e-57ccc72dcaa8.mp4
- https://github.com/tutao/tutanota/blob/master/src/desktop/ApplicationWindow.ts#L417
- https://github.com/tutao/tutanota/blob/master/src/desktop/ApplicationWindow.ts#L423
- https://github.com/tutao/tutanota/commit/88ecad17d00d05a722399aed35f0d280899d55a2
- https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644
- https://user-images.githubusercontent.com/46137338/270564886-7a0389d3-f9ef-44e1-9f5e-57ccc72dcaa8.mp4