Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-7379
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-16 May, 2014 | 15:55
Updated At-12 Apr, 2025 | 10:46

The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

ucdok
ucdok
>>tomato>>Versions up to 0.0.5(inclusive)
cpe:2.3:a:ucdok:tomato:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2014/05/13/1cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2014/05/15/2cve@mitre.org
N/A
https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8ccve@mitre.org
Exploit
Patch
https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weaknesscve@mitre.org
Exploit
http://www.openwall.com/lists/oss-security/2014/05/13/1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2014/05/15/2af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8caf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weaknessaf854a3a-2127-422b-91ae-364da2661108
Exploit
Change History
0Changes found

Details not found