CVE-2001-0749
CVSS7.5
发布时间 :2001-05-24 00:00:00
修订时间 :2008-09-05 16:24:50
NMCOS    

[原文]Beck IPC GmbH IPC@CHIP Embedded-Webserver allows remote attackers to read arbitrary files via a webserver root directory set to system root.


[CNNVD]Beck GmbH IPC@CHIP HTTP文件泄露漏洞(CNNVD-200105-096)

        Beck IPC GmbH IPC@CHIP Embedded-Webserver存在漏洞。远程攻击者借助设置为系统根的webserver根目录读取任意文件。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0749
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0749
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200105-096
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/archive/1/186418
(VENDOR_ADVISORY)  BUGTRAQ  20010524 IPC@Chip Security
http://xforce.iss.net/xforce/xfdb/8922
(VENDOR_ADVISORY)  XF  ipcchip-web-root-system(8922)
http://www.securityfocus.com/bid/2775
(VENDOR_ADVISORY)  BID  2775

- 漏洞信息

Beck GmbH IPC@CHIP HTTP文件泄露漏洞
高危 配置错误
2001-05-24 00:00:00 2006-11-14 00:00:00
远程  
        Beck IPC GmbH IPC@CHIP Embedded-Webserver存在漏洞。远程攻击者借助设置为系统根的webserver根目录读取任意文件。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

13963
Beck IPC GmbH IPC@Chip Embedded-Webserver Server Root Arbitrary File Access
Remote / Network Access Information Disclosure
Loss of Confidentiality Change Default Setting
Exploit Public Vendor Verified

- 漏洞描述

Beck's IPC GmbH IPC@Chip Web Server contains a flaw that may lead to an unauthorized information disclosure. The issue may allow an attacker to view arbitrary files in the root directory via a direct request, which will disclose potentially sensitive information, such user accounts and passwords, to a remote attacker.

- 时间线

2001-05-24 Unknow
2001-05-24 2001-06-01

- 解决方案

Currently, there are no known upgrades or patches to correct this vulnerability. It is possible to temporarily work around the flaw by implementing the following workaround: consult the vendor's documentation and change the default DOCUMENT_ROOT directive.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Beck GmbH IPC@CHIP HTTPD File Disclosure Vulnerability
Configuration Error 2775
Yes No
2001-05-21 12:00:00 2009-07-11 06:06:00
Reported to bugtraq by Siberian <i.am.a@x-men.com> on May 24, 2001.

- 受影响的程序版本

Beck IPC GmbH IPC@CHIP Embedded-Webserver

- 漏洞讨论

The IPC@Chip is a single-chip embedded webserver from Beck GmbH.

By default, the device's inbuilt httpd service uses the system root as its webroot. An attacker may request and obtain arbitrary files anywhere in the filesystem, including those containing sensitive information such as user IDs and passwords.

This leads to a complete compromise of the device's security, and could allow a remote attacker to undermine its normal operation.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站