Lucene search

K
certCERTVU:574739
HistorySep 14, 2001 - 12:00 a.m.

Beck GmbH IPC@Chip does not adequately validate user input thereby disclosing sensitive network data via crafted URL

2001-09-1400:00:00
www.kb.cert.org
10

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.013 Low

EPSS

Percentile

86.0%

Overview

An insecure default configuration in the Beck IPC@CHIP allows an intruder to obtain priviledged system information.

Description

The Beck IPC@CHIP is a single chip embedded webserver. The Beck IPC@CHIP ships with a cgi script named “ChipCfg”. Using a specially crafted url, an attacker can cause this cgi script to return sensitive network configuration data stored on the IPC@CHIP.


Impact

An intruder can gain access to sensitive network data stored on the IPC@CHIP.


Solution

According to Ernest Schloesser of Beck IPC GmbH, the API allows removal of this CGI with the CGI_REMOVE function.


Vendor Information

574739

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Beck GmbH __ Affected

Notified: May 21, 2001 Updated: July 17, 2002

Status

Affected

Vendor Statement

Please see <http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23574739 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Sentry Research Labs.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-1341
Severity Metric: 6.75 Date Public:

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.013 Low

EPSS

Percentile

86.0%