A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.
References
Link | Resource |
---|---|
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 | Third Party Advisory |
https://www.npmjs.com/package/%40perfood/couch-auth | Product |
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 | Third Party Advisory |
https://www.npmjs.com/package/%40perfood/couch-auth | Product |
Configurations
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 - Third Party Advisory | |
References | () https://www.npmjs.com/package/%40perfood/couch-auth - Product |
09 Jan 2024, 19:28
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 | |
References | () https://www.npmjs.com/package/%40perfood/couch-auth - Product | |
References | () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 - Third Party Advisory | |
First Time |
Perfood couchauth
Perfood |
|
CPE | cpe:2.3:a:perfood:couchauth:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
03 Jan 2024, 13:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-03 13:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39655
Mitre link : CVE-2023-39655
CVE.ORG link : CVE-2023-39655
JSON object : View
Products Affected
perfood
- couchauth
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')