|
Message-ID: <CALKeL-M8wreyyeUigfN=au1foco8K1fJXDEe-5EEEjXoYzsbiA@mail.gmail.com> Date: Wed, 23 Jan 2019 14:21:30 -0800 From: Mike Jumper <mjumper@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2018-1340: Apache Guacamole: Secure flag missing from session cookie CVE-2018-1340: Secure flag missing from Apache Guacamole session cookie Versions affected: Apache Guacamole 0.9.4 through 0.9.14 Description: Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain. Mitigation: Users of Apache Guacamole 0.9.14 or older should upgrade to 1.0.0. Credit: We would like to thank Ross Golder for reporting this issue.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.