Description
The admin API in the tomato module before 0.0.6 for Node.js does not properly check the access key when it is set to a string, which allows remote attackers to bypass authentication via a string in the access-key header that partially matches config.master.api.access_key.
Remediation
References
http://www.openwall.com/lists/oss-security/2014/05/13/1
http://www.openwall.com/lists/oss-security/2014/05/15/2
https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c
https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness
Related Vulnerabilities
CVE-2023-50730 Vulnerability in maven package edu.gemini:gsp-graphql-core_2.13
CVE-2021-4245 Vulnerability in npm package rfc6902
CVE-2023-46122 Vulnerability in maven package org.scala-sbt:io_2.13
CVE-2020-5497 Vulnerability in maven package org.mitre:openid-connect-common
CVE-2023-29210 Vulnerability in maven package org.xwiki.platform:xwiki-platform-notifications-ui