Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1340

Опубликовано: 07 фев. 2019
Источник: debian

Описание

Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
guacamole-clientremovedpackage
guacamole-clientno-dsastretchpackage
guacamole-clientnot-affectedjessiepackage
guacamoleremovedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2019/01/24/2

  • https://issues.apache.org/jira/browse/GUACAMOLE-549

  • https://github.com/apache/guacamole-client/pull/273

  • https://www.openwall.com/lists/oss-security/2019/02/02/1

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.

CVSS3: 7.5
nvd
почти 7 лет назад

Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.

CVSS3: 7.5
github
больше 3 лет назад

Missing Encryption of Sensitive Data in Apache Guacamole