Vulnerability Description
The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ucdok | Tomato | <= 0.0.5 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2014/05/13/1
- http://www.openwall.com/lists/oss-security/2014/05/15/2
- https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d5ExploitPatch
- https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_WeaknessExploit
- http://www.openwall.com/lists/oss-security/2014/05/13/1
- http://www.openwall.com/lists/oss-security/2014/05/15/2
- https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d5ExploitPatch
- https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_WeaknessExploit
FAQ
What is CVE-2013-7379?
CVE-2013-7379 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in th...
How severe is CVE-2013-7379?
CVE-2013-7379 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7379?
Check the references section above for vendor advisories and patch information. Affected products include: Ucdok Tomato.