{"uuid": "fc7a0d0b-fa90-4ce6-9a46-9006174a2c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/cibsecurity/74317", "content": "\u203c\ufe0fCVE-2023-39655\u203c\ufe0f\n\nA host header injection vulnerability exists in the NPM package perfoodcouchauth versions  0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attackercontrolled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:35:39.000000Z"}