Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979@%3Cannounce.guacamole.apache.org%3E | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/106768 | Third Party Advisory |
Configurations
Information
Published : 2019-02-07 14:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-1340
Mitre link : CVE-2018-1340
JSON object : View
CWE
CWE-311
Missing Encryption of Sensitive Data
Products Affected
apache
- guacamole