A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions <= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fqh6-6h6c-366m | CouchAuth host header injection vulnerability leaks the password reset token |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-18T15:24:04.602Z
Reserved: 2023-08-07T00:00:00.000Z
Link: CVE-2023-39655
Updated: 2024-08-02T18:18:09.602Z
Status : Modified
Published: 2024-01-03T13:15:08.467
Modified: 2025-06-18T16:15:21.380
Link: CVE-2023-39655
No data.
OpenCVE Enrichment
No data.
Github GHSA