|
Message-ID: <20190201122721.GA17576@eldamar.local> Date: Fri, 1 Feb 2019 13:27:21 +0100 From: Salvatore Bonaccorso <carnil@...ian.org> To: oss-security@...ts.openwall.com Subject: Re: CVE-2018-1340: Apache Guacamole: Secure flag missing from session cookie Hi Mike, On Wed, Jan 23, 2019 at 02:21:30PM -0800, Mike Jumper wrote: > CVE-2018-1340: Secure flag missing from Apache Guacamole session cookie > > Versions affected: > Apache Guacamole 0.9.4 through 0.9.14 > > Description: > Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage > of the user's session token. This cookie lacked the "secure" flag, > which could allow an attacker eavesdropping on the network to > intercept the user's session token if unencrypted HTTP requests are > made to the same domain. > > Mitigation: > Users of Apache Guacamole 0.9.14 or older should upgrade to 1.0.0. > > Credit: > We would like to thank Ross Golder for reporting this issue. Would it be possible to confirm, is this https://issues.apache.org/jira/browse/GUACAMOLE-549 https://github.com/apache/guacamole-client/commit/884a9c0ee987f9cb49a69 ? Regards, Salvatore
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.