Korean
<< Back
VID 22261
Severity 20
Port 7070,8080
Protocol TCP
Class WWW
Detailed Description The target RealServer allows any anonymous user to download the default.cfg file.
RealNetworks RealServer is a popular streaming audio and video server. RealServer ships with a default.cfg file in the RealAdministrator\Docs directory. This configuration file is used by RealServer technical support personnel to help customers work through problems they encounter while configuring some of the more advanced features of RealServer. All versions of RealServer 7 could allow an unauthorized user to access this configuration file without being prompted for a user name and password. In itself, this vulnerability does not allow unauthorized users access to the contents of the RealServer administrator's computer; but it gives such users access to the RealServer administrator's password for authentication at installation time. Because user names are not stored in the configuration file, unauthorized users cannot retrieve the administrator's user name, however this file should not be accessible via the web browser.

* Note: This check solely relied on the version number of remote Real Server to assess this vulnerability, so this might be a false positive.

* References:
http://www.service.real.com/help/faq/security/configaccess.html

* Platforms Affected:
RealNetworks, Inc., All versions of RealServer 7
Linux Any version
Microsoft Windows Any version
Recommendation To restrict unauthorized access to default.cfg file, you should perform the following steps:

1. Move the default.cfg file from the Docs directory to a more secure location, such as the root RealServer installation directory.
2. Change the user name/password combination you use to access your RealServer administration system.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)