Vulnerabilities/

CouchAuth host header injection vulnerability leaks the password reset token

Severity:
High

Description

A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token.

Recommendation

No fix is available yet. Followings are affected versions:

References

Related Issues

Tags:
npm
@perfood/couch-auth
Anything's wrong? Let us know Last updated on January 09, 2024

This issue is available in SmartScanner Professional

See Pricing