{"vulnerability": "cve-2023-39655", "sightings": [{"uuid": "14b819ec-399f-4635-a8b5-aa1d04dc363e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/ctinow/162373", "content": "https://ift.tt/X3dJOmE\nCVE-2023-39655", "creation_timestamp": "2024-01-03T14:26:30.000000Z"}, {"uuid": "a84ecd11-f17e-48b1-aa56-c6c72572ee9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18766", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-39655\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A host header injection vulnerability exists in the NPM package @perfood/couch-auth versions &lt;= 0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\ud83d\udccf Published: 2024-01-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T15:24:04.602Z\n\ud83d\udd17 References:\n1. https://www.npmjs.com/package/%40perfood/couch-auth\n2. https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-39655", "creation_timestamp": "2025-06-18T15:42:57.000000Z"}, {"uuid": "fc7a0d0b-fa90-4ce6-9a46-9006174a2c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/cibsecurity/74317", "content": "\u203c\ufe0fCVE-2023-39655\u203c\ufe0f\n\nA host header injection vulnerability exists in the NPM package perfoodcouchauth versions  0.20.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attackercontrolled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords and take over their accounts.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:35:39.000000Z"}, {"uuid": "7dd6cd02-e8d3-4f02-8e96-a47176007fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39655", "type": "seen", "source": "https://t.me/ctinow/172148", "content": "https://ift.tt/EGtZbin\nCVE-2023-39655 | perfood couch-auth up to 0.20.0 Header Host password recovery", "creation_timestamp": "2024-01-23T17:26:50.000000Z"}]}