发布时间 :2001-05-24 00:00:00
修订时间 :2008-09-10 15:10:19

[原文]The Beck GmbH IPC@Chip embedded web server installs the chipcfg.cgi program by default, which allows remote attackers to obtain sensitive network information via a request to the program.

[CNNVD]Beck IPC GmbH IPC@CHIP Network信息泄露漏洞(CNNVD-200105-094)

        Beck GmbH IPC@Chip嵌入的web服务器默认安装chipcfg.cgi程序,远程攻击者借助到该程序的请求获取敏感网络信息。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20010524 IPC@Chip Security
(VENDOR_ADVISORY)  XF  ipcchip-chipcfg-gain-information(6600)
(UNKNOWN)  BUGTRAQ  20010602 IPC@Chip - Fixes

- 漏洞信息

Beck IPC GmbH IPC@CHIP Network信息泄露漏洞
中危 设计错误
2001-05-24 00:00:00 2005-10-20 00:00:00
        Beck GmbH IPC@Chip嵌入的web服务器默认安装chipcfg.cgi程序,远程攻击者借助到该程序的请求获取敏感网络信息。

- 公告与补丁

        The vendor reports: "The API allows removal of this CGI with the CGI_REMOVE function".

- 漏洞信息

Beck IPC GmbH IPC@Chip Web Server chipcfg.cgi Direct Request Information Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality Workaround
Exploit Public Vendor Verified

- 漏洞描述

Beck IPC GmbH IPC@Chip Web Server contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by sending a direct request to the the 'chipcfg.cgi' script, which will disclose network configuration settings to a remote attacker resulting in a loss of confidentiality.

- 时间线

2001-05-24 Unknow
2001-05-24 2001-06-01

- 解决方案

Currently, there are no known upgrades or patches to correct this vulnerability. It is possible to temporarily work around the flaw by implementing the following workaround: consult the vendor's documentation for the API CGI_REMOVE function.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Beck IPC GmbH IPC@CHIP Network Information Disclosure Vulnerability
Design Error 2767
Yes No
2001-05-24 12:00:00 2009-07-11 06:06:00
Discovered and posted to Bugtraq by Siberian <> on May 21, 2001.

- 受影响的程序版本

Beck IPC GmbH IPC@CHIP Embedded-Webserver

- 漏洞讨论

A vulnerability exists in IPC@CHIP which could enable a remote user to gain access to ChipCfg.cgi. A specially crafted URL for ChipCfg.cgi will return sensitive network data. ChipCfg.cgi is installed by default. The vendor reports that it can be uninstalled.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

The vendor reports: "The API allows removal of this CGI with the CGI_REMOVE function".

- 相关参考