A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.
References
| Link | Resource |
|---|---|
| https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 | Third Party Advisory |
| https://www.npmjs.com/package/%40perfood/couch-auth | Product |
| https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 | Third Party Advisory |
| https://www.npmjs.com/package/%40perfood/couch-auth | Product |
Configurations
History
21 Nov 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 - Third Party Advisory | |
| References | () https://www.npmjs.com/package/%40perfood/couch-auth - Product |
09 Jan 2024, 19:28
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:perfood:couchauth:*:*:*:*:*:node.js:*:* | |
| References | () https://www.npmjs.com/package/%40perfood/couch-auth - Product | |
| References | () https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655 - Third Party Advisory | |
| First Time |
Perfood
Perfood couchauth |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
| CWE | CWE-74 |
03 Jan 2024, 13:48
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-03 13:15
Updated : 2025-06-18 16:15
NVD link : CVE-2023-39655
Mitre link : CVE-2023-39655
CVE.ORG link : CVE-2023-39655
JSON object : View
Products Affected
perfood
- couchauth
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
