search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Beck GmbH IPC@CHIP HTTPD vulernable to arbitrary file disclosure

Vulnerability Note VU#718971

Original Release Date: 2001-09-10 | Last Revised: 2001-09-10

Overview

The Beck IPC@CHIP web server permits intruders to access files outside the web root.

Description

The Beck IPC@CHIP is a single chip embedded webserver. The Web Server's root directory is set to / by default. Because of this default setting, an attacker can download arbitrary files from any location on the system. One of the files available to an attacker is the chip.ini file. This file contains all of the login names and associated passwords for the device.

Impact

Unless the user changes the default settings on the Beck IPC@CHIP, an intruder can download arbitrary files from any location on the system including the chip.ini file and view all usernames and their associated passwords for the device. An intruder could then gain access to any account on the device.

Solution

Change the default settings on the web server such that / is not the web server's root directory.

Vendor Information

718971
 

BeckGmbH Affected

Notified:  May 21, 2001 Updated: September 06, 2001

Status

Affected

Vendor Statement

Please see http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Sentry Research Labs.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-0749
Severity Metric: 20.25
Date Public: 2001-05-24
Date First Published: 2001-09-10
Date Last Updated: 2001-09-10 16:53 UTC
Document Revision: 25

Sponsored by CISA.