← Volver a CVEs
CVE-2023-39655
CRITICAL9.6
Descripcion
A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.
Detalles CVE
Puntuacion CVSS v3.19.6
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado1/3/2024
Ultima modificacion6/18/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
perfood:couchauth
Debilidades (CWE)
CWE-74CWE-74
Referencias
https://www.npmjs.com/package/%40perfood/couch-auth(cve@mitre.org)
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655(af854a3a-2127-422b-91ae-364da2661108)
https://www.npmjs.com/package/%40perfood/couch-auth(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.