The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2020-0607 | The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key. | 
  Github GHSA | 
                GHSA-9vxc-g2jx-qj3p | API Admin Auth Weakness in tomato | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T18:09:16.971Z
Reserved: 2014-05-14T00:00:00
Link: CVE-2013-7379
No data.
Status : Deferred
Published: 2014-05-16T15:55:04.333
Modified: 2025-04-12T10:46:40.837
Link: CVE-2013-7379
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA