CouchAuth host header injection vulnerability leaks the password reset token
- Severity:
- High
Description
A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token.
Recommendation
No fix is available yet. Followings are affected versions:
- <= 0.20.0
References
Related Issues
- CouchAuth has a Server-Side Template Injection vulnerability in its email functionality - CVE-2024-57177
- chromedriver Command Injection vulnerability - CVE-2023-26156
- Strapi may leak sensitive user information, user reset password, tokens via content-manager views - CVE-2023-36472
- Strapi may leak sensitive user information, user reset password, tokens via content-manager views (GHSA-v8gg-4mq2-88q4) - CVE-2023-36472
- Tags:
- npm
- @perfood/couch-auth
Anything's wrong? Let us know Last updated on January 09, 2024