The following table lists the changes that have been made to the
CVE-2024-57177 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
CVE Modified
by 134c704f-9b21-4f2e-91b3-4a467353bcc0Feb. 10, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Removed CVSS V3.1 AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L -
CVE Modified
by 134c704f-9b21-4f2e-91b3-4a467353bcc0Feb. 10, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Added CWE CWE-74 -
New CVE Received
by [email protected]Feb. 10, 2025
Action Type Old Value New Value Added Description A host header injection vulnerability exists in the NPM package of perfood/couch-auth <= 0.21.2. By sending a specially crafted host header in the email change confirmation request, it is possible to trigger a SSTI which can be leveraged to run limited commands or leak server-side information Added Reference https://github.com/perfood/couch-auth Added Reference https://github.com/waristea/cve-research/tree/main/CVE-2024-57177