GSD-2013-7379
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-7379",
"description": "The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.",
"id": "GSD-2013-7379"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-7379"
],
"details": "The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.",
"id": "GSD-2013-7379",
"modified": "2023-12-13T01:22:18.722416Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20140514 Re: CVE request: various NodeJS module vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/2"
},
{
"name": "[oss-security] 20140513 CVE request: various NodeJS module vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/13/1"
},
{
"name": "https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness"
},
{
"name": "https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c",
"refsource": "CONFIRM",
"url": "https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c=0.0.5",
"affected_versions": "All versions up to 0.0.5",
"credit": "Adam Baldwin",
"cvss_v2": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-287",
"CWE-937"
],
"date": "2014-05-16",
"description": "The tomato API uses an access key to protect the admin API from unauthorized access. The key passed as parameter is checked to see if it is included in the configured value, not equal. As a result a single character contained in the key is sufficient to gain access to the admin API.",
"fixed_versions": [
"0.0.6"
],
"identifier": "CVE-2013-7379",
"identifiers": [
"CVE-2013-7379"
],
"not_impacted": "All versions after 0.0.5",
"package_slug": "npm/tomato",
"pubdate": "2014-05-16",
"solution": "Upgrade to version 0.0.6 or above.",
"title": "API admin authentication weakness",
"urls": [
"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7379"
],
"uuid": "62f2dc7e-7dab-4b0d-86f6-1d655d1cdacd"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ucdok:tomato:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndIncluding": "0.0.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7379"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c"
},
{
"name": "[oss-security] 20140513 CVE request: various NodeJS module vulnerabilities",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2014/05/13/1"
},
{
"name": "[oss-security] 20140514 Re: CVE request: various NodeJS module vulnerabilities",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/2"
},
{
"name": "https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2014-05-16T17:55Z",
"publishedDate": "2014-05-16T15:55Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…