Critical severityNVD Advisory· Published May 16, 2014· Updated May 6, 2026
CVE-2013-7379
CVE-2013-7379
Description
The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
tomatonpm | < 0.0.6 | 0.0.6 |
Affected products
1Patches
19e427d524e04Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8cnvdExploitPatchWEB
- nodesecurity.io/advisories/Tomato_API_Admin_Auth_WeaknessnvdExploit
- github.com/advisories/GHSA-9vxc-g2jx-qj3pghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2013-7379ghsaADVISORY
- www.openwall.com/lists/oss-security/2014/05/13/1nvdWEB
- www.openwall.com/lists/oss-security/2014/05/15/2nvdWEB
- www.npmjs.com/advisories/38ghsaWEB
News mentions
0No linked articles in our index yet.