Tutanota (Tuta Mail) is an encrypted email provider. Tutanota allows users to open links in emails in external applications. Prior to version 3.118.12, it correctly blocks the `file:` URL scheme, which can be used by malicious actors to gain code execution on a victims computer, however fails to check other harmful schemes such as `ftp:`, `smb:`, etc. which can also be used. Successful exploitation of this vulnerability will enable an attacker to gain code execution on a victim's computer. Version 3.118.2 contains a patch for this issue.
History

Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-12-15T13:44:05.153Z

Updated: 2024-10-08T14:14:03.776Z

Reserved: 2023-10-16T17:51:35.570Z

Link: CVE-2023-46116

cve-icon Vulnrichment

Updated: 2024-08-02T20:37:39.493Z

cve-icon NVD

Status : Modified

Published: 2023-12-15T14:15:14.633

Modified: 2024-11-21T08:27:54.640

Link: CVE-2023-46116

cve-icon Redhat

No data.