Description
Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5629 | Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain. |
Github GHSA |
GHSA-wr7r-vg3c-54r5 | Missing Encryption of Sensitive Data in Apache Guacamole |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T19:20:49.021Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1340
No data.
Status : Modified
Published: 2019-02-07T22:29:00.287
Modified: 2024-11-21T03:59:39.510
Link: CVE-2018-1340
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA