You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"summary": "Tuta Mail has DOM attribute and CSS injection in its Contact Viewer feature",
8
+
"details": "### Impact\nUsers importing contacts from untrusted sources.\n\nSpecifically crafted contact data can lead to some of DOM modifications for the link button next to the field e.g. the link address can be overriden. CSS can be manipulated to give the button arbitrary look and change it's size so that any click on the screen would lead to the specified URL. Modifying event listeners does *not* seem to be possible so no JS can be executed (which would also be prevented by CSP).\n\n## Technical details\nThe data is included as part of the [mithril's hyperscript selector](https://mithril.js.org/hyperscript.html#css-selectors). It is possible to define a value like `][href=https://ddg.gg][style=position:fixed;width:150vw;height:200vh` which will be included in the selector passed to Mithril and will be interpreted as part of the code.\n\n### Patches\nhttps://github.com/tutao/tutanota/commit/e28345f5f78f628f9d5c04e785f79543f01dca8b\n\n### Workarounds\nDo not open contact viewer on unpatched versions. If the contact was opened, close the app or use keyboard shortcuts to switch to another part of the app.",
0 commit comments