GHSA-24V3-254G-JV85

Vulnerability from github – Published: 2025-12-19 21:32 – Updated: 2025-12-19 21:32
VLAI?
Summary
Tuta Mail has DOM attribute and CSS injection in its Contact Viewer feature
Details

Impact

Users importing contacts from untrusted sources.

Specifically crafted contact data can lead to some of DOM modifications for the link button next to the field e.g. the link address can be overriden. CSS can be manipulated to give the button arbitrary look and change it's size so that any click on the screen would lead to the specified URL. Modifying event listeners does not seem to be possible so no JS can be executed (which would also be prevented by CSP).

Technical details

The data is included as part of the mithril's hyperscript selector. It is possible to define a value like ][href=https://ddg.gg][style=position:fixed;width:150vw;height:200vh which will be included in the selector passed to Mithril and will be interpreted as part of the code.

Patches

https://github.com/tutao/tutanota/commit/e28345f5f78f628f9d5c04e785f79543f01dca8b

Workarounds

Do not open contact viewer on unpatched versions. If the contact was opened, close the app or use keyboard shortcuts to switch to another part of the app.

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "npm",
        "name": "@tutao/tutanota-utils"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "314.251111.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [],
  "database_specific": {
    "cwe_ids": [
      "CWE-1021",
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2025-12-19T21:32:35Z",
    "nvd_published_at": null,
    "severity": "LOW"
  },
  "details": "### Impact\nUsers importing contacts from untrusted sources.\n\nSpecifically crafted contact data can lead to some of DOM modifications for the link button next to the field e.g. the link address can be overriden. CSS can be manipulated to give the button arbitrary look and change it\u0027s size so that any click on the screen would lead to the specified URL. Modifying event listeners does *not* seem to be possible so no JS can be executed (which would also be prevented by CSP).\n\n## Technical details\nThe data is included as part of the [mithril\u0027s hyperscript selector](https://mithril.js.org/hyperscript.html#css-selectors). It is possible to define a value like `][href=https://ddg.gg][style=position:fixed;width:150vw;height:200vh` which will be included in the selector passed to Mithril and will be interpreted as part of the code.\n\n### Patches\nhttps://github.com/tutao/tutanota/commit/e28345f5f78f628f9d5c04e785f79543f01dca8b\n\n### Workarounds\nDo not open contact viewer on unpatched versions. If the contact was opened, close the app or use keyboard shortcuts to switch to another part of the app.",
  "id": "GHSA-24v3-254g-jv85",
  "modified": "2025-12-19T21:32:35Z",
  "published": "2025-12-19T21:32:35Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/security/advisories/GHSA-24v3-254g-jv85"
    },
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/commit/e28345f5f78f628f9d5c04e785f79543f01dca8b"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/tutao/tutanota"
    },
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/blob/452700a96d490646550ad2a02229973590291faf/src/mail-app/contacts/view/ContactViewer.ts#L326"
    },
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/blob/452700a96d490646550ad2a02229973590291faf/src/mail-app/contacts/view/ContactViewer.ts#L341"
    },
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/blob/452700a96d490646550ad2a02229973590291faf/src/mail-app/contacts/view/ContactViewer.ts#L356"
    },
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/blob/452700a96d490646550ad2a02229973590291faf/src/mail-app/contacts/view/ContactViewer.ts#L391"
    },
    {
      "type": "WEB",
      "url": "https://github.com/tutao/tutanota/blob/452700a96d490646550ad2a02229973590291faf/src/mail-app/contacts/view/ContactViewer.ts#L415"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "Tuta Mail has DOM attribute and CSS injection in its Contact Viewer feature"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…