CVE-2024-23330: CWE-918: Server-Side Request Forgery (SSRF) in tutao tutanota
Tuta is an encrypted email service. In versions prior to 119.10, an attacker can attach an image in a html mail which is loaded from external resource in the default setting, which should prevent loading of external resources. When displaying emails containing external content, they should be loaded by default only after confirmation by the user. However, it could be recognized that certain embedded images (see PoC) are loaded, even though the "Automatic Reloading of Images" function is disabled by default. The reloading is also done unencrypted via HTTP and redirections are followed. This behavior is unexpected for the user, since the user assumes that external content will only be loaded after explicit manual confirmation. The loading of external content in e-mails represents a risk, because this makes the sender aware that the e-mail address is used, when the e-mail was read, which device is used and expose the user's IP address. Version 119.10 contains a patch for this issue.
AI Analysis
Technical Summary
CVE-2024-23330 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Tutanota encrypted email service, specifically affecting versions prior to 119.10. Tutanota is designed to provide secure email communication with privacy protections, including the prevention of automatic loading of external content in emails to avoid leaking user information. However, due to this vulnerability, an attacker can craft an HTML email containing an embedded image that is loaded from an external resource even when the "Automatic Reloading of Images" feature is disabled by default. This unintended behavior causes the Tutanota client to fetch external content unencrypted over HTTP and follow redirections without user consent. The SSRF aspect arises because the email client itself makes the external HTTP requests, potentially exposing internal network details or allowing attackers to probe internal services indirectly. The primary risk is that the sender of the malicious email can detect when the email is opened, identify the device used, and obtain the user's IP address, thereby compromising user privacy and anonymity. This undermines the core privacy guarantees of Tutanota. The vulnerability does not require any user interaction beyond opening the email, and no authentication is needed to exploit it. The issue was addressed in version 119.10 with a patch that prevents automatic loading of external resources without explicit user confirmation. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact without integrity or availability compromise.
Potential Impact
For European organizations, especially those relying on Tutanota for secure communications, this vulnerability poses a significant privacy risk. The unintended loading of external content can lead to exposure of sensitive metadata such as IP addresses and device information, which can be leveraged for targeted surveillance, profiling, or further attacks. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data, intellectual property, or confidential communications) may face compliance risks if user privacy is compromised. The SSRF nature of the vulnerability could also be exploited to perform internal network reconnaissance if the email client environment allows access to internal resources, potentially leading to lateral movement or escalation in complex attack scenarios. Since Tutanota is popular among privacy-conscious users and entities in Europe, including NGOs, journalists, and governmental bodies, the impact on confidentiality is particularly critical. However, the vulnerability does not affect message integrity or availability, limiting the scope of damage to privacy breaches rather than data manipulation or service disruption.
Mitigation Recommendations
European organizations using Tutanota should immediately upgrade all client installations to version 119.10 or later to apply the official patch. Until the upgrade is complete, users should be educated to avoid opening suspicious HTML emails or emails from unknown senders, especially those containing embedded images or external content. Organizations can implement network-level controls to block or monitor outbound HTTP requests from email clients to untrusted external domains, reducing the risk of data leakage. Additionally, configuring email gateways or security appliances to sanitize incoming emails by removing or disabling external content can provide a protective layer. For high-security environments, consider disabling HTML email rendering entirely or using text-only email clients. Regular auditing and monitoring of email client behavior and network traffic can help detect exploitation attempts. Finally, organizations should review their privacy policies and incident response plans to address potential data exposure incidents stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Austria, Switzerland
CVE-2024-23330: CWE-918: Server-Side Request Forgery (SSRF) in tutao tutanota
Description
Tuta is an encrypted email service. In versions prior to 119.10, an attacker can attach an image in a html mail which is loaded from external resource in the default setting, which should prevent loading of external resources. When displaying emails containing external content, they should be loaded by default only after confirmation by the user. However, it could be recognized that certain embedded images (see PoC) are loaded, even though the "Automatic Reloading of Images" function is disabled by default. The reloading is also done unencrypted via HTTP and redirections are followed. This behavior is unexpected for the user, since the user assumes that external content will only be loaded after explicit manual confirmation. The loading of external content in e-mails represents a risk, because this makes the sender aware that the e-mail address is used, when the e-mail was read, which device is used and expose the user's IP address. Version 119.10 contains a patch for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-23330 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Tutanota encrypted email service, specifically affecting versions prior to 119.10. Tutanota is designed to provide secure email communication with privacy protections, including the prevention of automatic loading of external content in emails to avoid leaking user information. However, due to this vulnerability, an attacker can craft an HTML email containing an embedded image that is loaded from an external resource even when the "Automatic Reloading of Images" feature is disabled by default. This unintended behavior causes the Tutanota client to fetch external content unencrypted over HTTP and follow redirections without user consent. The SSRF aspect arises because the email client itself makes the external HTTP requests, potentially exposing internal network details or allowing attackers to probe internal services indirectly. The primary risk is that the sender of the malicious email can detect when the email is opened, identify the device used, and obtain the user's IP address, thereby compromising user privacy and anonymity. This undermines the core privacy guarantees of Tutanota. The vulnerability does not require any user interaction beyond opening the email, and no authentication is needed to exploit it. The issue was addressed in version 119.10 with a patch that prevents automatic loading of external resources without explicit user confirmation. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact without integrity or availability compromise.
Potential Impact
For European organizations, especially those relying on Tutanota for secure communications, this vulnerability poses a significant privacy risk. The unintended loading of external content can lead to exposure of sensitive metadata such as IP addresses and device information, which can be leveraged for targeted surveillance, profiling, or further attacks. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data, intellectual property, or confidential communications) may face compliance risks if user privacy is compromised. The SSRF nature of the vulnerability could also be exploited to perform internal network reconnaissance if the email client environment allows access to internal resources, potentially leading to lateral movement or escalation in complex attack scenarios. Since Tutanota is popular among privacy-conscious users and entities in Europe, including NGOs, journalists, and governmental bodies, the impact on confidentiality is particularly critical. However, the vulnerability does not affect message integrity or availability, limiting the scope of damage to privacy breaches rather than data manipulation or service disruption.
Mitigation Recommendations
European organizations using Tutanota should immediately upgrade all client installations to version 119.10 or later to apply the official patch. Until the upgrade is complete, users should be educated to avoid opening suspicious HTML emails or emails from unknown senders, especially those containing embedded images or external content. Organizations can implement network-level controls to block or monitor outbound HTTP requests from email clients to untrusted external domains, reducing the risk of data leakage. Additionally, configuring email gateways or security appliances to sanitize incoming emails by removing or disabling external content can provide a protective layer. For high-security environments, consider disabling HTML email rendering entirely or using text-only email clients. Regular auditing and monitoring of email client behavior and network traffic can help detect exploitation attempts. Finally, organizations should review their privacy policies and incident response plans to address potential data exposure incidents stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-15T15:19:19.442Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c098182aa0cae2b3b726
Added to database: 5/30/2025, 2:28:40 PM
Last enriched: 7/8/2025, 7:55:11 PM
Last updated: 8/12/2025, 5:16:25 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.