{"vuid":"VU#718971","idnumber":"718971","name":"Beck GmbH IPC@CHIP HTTPD vulernable to arbitrary file disclosure","keywords":["Beck GmbH","IPC@CHIP","HTTPD","file disclosure","usernames","passwords"],"overview":"The Beck IPC@CHIP web server permits intruders to access files outside the web root.","clean_desc":"The Beck IPC@CHIP is a single chip embedded webserver. The Web Server's root directory is set to  /  by default. Because of this default setting, an attacker can download arbitrary files from any location on the system. One of the files available to an attacker is the chip.ini file. This file contains all of the login names and associated passwords for the device.","impact":"Unless the user changes the default settings on the Beck IPC@CHIP, an intruder can download arbitrary files from any location on the system including the chip.ini file and view all usernames and their associated passwords for the device. An intruder could then gain access to any account on the device.","resolution":"","workarounds":"Change the default settings on the web server such that / is not the web server's root directory.","sysaffected":"","thanks":"This vulnerability was discovered by \nSentry Research Labs","author":"This document was written by Ian A. Finlay.","public":["http://www.securityfocus.com/bid/2775","http://sentry-labs.com/files/ipc0101052101eng.txt"],"cveids":["CVE-2001-0749"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-06-06T13:33:33Z","publicdate":"2001-05-24T00:00:00Z","datefirstpublished":"2001-09-10T16:53:40Z","dateupdated":"2001-09-10T16:53:41Z","revision":25,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"5","cam_impact":"18","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"20.25","cam_scorecurrentwidelyknown":"20.25","cam_scorecurrentwidelyknownexploited":"33.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":20.25,"vulnote":null}