A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.
References
Link | Resource |
---|---|
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 | Third Party Advisory |
https://www.npmjs.com/package/%40perfood/couch-auth | Product |
Configurations
History
No history.
Information
Published : 2024-01-03 13:15
Updated : 2024-01-09 19:28
NVD link : CVE-2023-39655
Mitre link : CVE-2023-39655
CVE.ORG link : CVE-2023-39655
JSON object : View
Products Affected
perfood
- couchauth
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')