Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
References
Configurations
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106768 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E - |
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-02-07 22:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1340
Mitre link : CVE-2018-1340
CVE.ORG link : CVE-2018-1340
JSON object : View
Products Affected
apache
- guacamole
CWE
CWE-311
Missing Encryption of Sensitive Data