Описание
Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| guacamole-client | removed | package | ||
| guacamole-client | no-dsa | stretch | package | |
| guacamole-client | not-affected | jessie | package | |
| guacamole | removed | package |
Примечания
https://www.openwall.com/lists/oss-security/2019/01/24/2
https://issues.apache.org/jira/browse/GUACAMOLE-549
https://github.com/apache/guacamole-client/pull/273
https://www.openwall.com/lists/oss-security/2019/02/02/1
Связанные уязвимости
Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
Missing Encryption of Sensitive Data in Apache Guacamole