- Description
- A host header injection vulnerability exists in the NPM package of perfood/couch-auth <= 0.21.2. By sending a specially crafted host header in the email change confirmation request, it is possible to trigger a SSTI which can be leveraged to run limited commands or leak server-side information
- Source
- cve@mitre.org
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 7.3
- Impact score
- 3.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-74
- Hype score
- Not currently trending
🚨 CVE-2024-57177 🔴 HIGH (7.3) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/UUs2SLUrdq 🔗 https://t.co/haHINKRdWs #CyberCron #VulnAlert https://t.co/QcfQQ0T9Gj
@cybercronai
12 Feb 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-57177 Host Header Injection in NPM Couch-Auth Package Enables Server-Side Template Injection https://t.co/si7WcszvU0
@VulmonFeeds
11 Feb 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-57177 A host header injection vulnerability exists in the NPM package of perfood/couch-auth <= 0.21.2. By sending a specially crafted host header in the email change confir… https://t.co/LVHbxT8gbU
@CVEnew
10 Feb 2025
350 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes