Vulnerability Note VU#718971
Beck GmbH IPC@CHIP HTTPD vulernable to arbitrary file disclosure
The Beck IPC@CHIP web server permits intruders to access files outside the web root.
The Beck IPC@CHIP is a single chip embedded webserver. The Web Server's root directory is set to / by default. Because of this default setting, an attacker can download arbitrary files from any location on the system. One of the files available to an attacker is the chip.ini file. This file contains all of the login names and associated passwords for the device.
Unless the user changes the default settings on the Beck IPC@CHIP, an intruder can download arbitrary files from any location on the system including the chip.ini file and view all usernames and their associated passwords for the device. An intruder could then gain access to any account on the device.
Change the default settings on the web server such that / is not the web server's root directory.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|BeckGmbH||Affected||21 May 2001||06 Sep 2001|
CVSS Metrics (Learn More)
This vulnerability was discovered by Sentry Research Labs.
This document was written by Ian A. Finlay.
- CVE IDs: Unknown
- Date Public: 24 May 2001
- Date First Published: 10 Sep 2001
- Date Last Updated: 10 Sep 2001
- Severity Metric: 20.25
- Document Revision: 25
If you have feedback, comments, or additional information about this vulnerability, please send us email.