Vulnerability Note VU#718971

Beck GmbH IPC@CHIP HTTPD vulernable to arbitrary file disclosure

Original Release date: 10 Sep 2001 | Last revised: 10 Sep 2001

Overview

The Beck IPC@CHIP web server permits intruders to access files outside the web root.

Description

The Beck IPC@CHIP is a single chip embedded webserver. The Web Server's root directory is set to / by default. Because of this default setting, an attacker can download arbitrary files from any location on the system. One of the files available to an attacker is the chip.ini file. This file contains all of the login names and associated passwords for the device.

Impact

Unless the user changes the default settings on the Beck IPC@CHIP, an intruder can download arbitrary files from any location on the system including the chip.ini file and view all usernames and their associated passwords for the device. An intruder could then gain access to any account on the device.

Solution

Change the default settings on the web server such that / is not the web server's root directory.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
BeckGmbHAffected21 May 200106 Sep 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered by Sentry Research Labs.

This document was written by Ian A. Finlay.

Other Information

  • CVE IDs: Unknown
  • Date Public: 24 May 2001
  • Date First Published: 10 Sep 2001
  • Date Last Updated: 10 Sep 2001
  • Severity Metric: 20.25
  • Document Revision: 25

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.