Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 1 Feb 2019 13:27:21 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2018-1340: Apache Guacamole: Secure flag
 missing from session cookie

Hi Mike,

On Wed, Jan 23, 2019 at 02:21:30PM -0800, Mike Jumper wrote:
> CVE-2018-1340: Secure flag missing from Apache Guacamole session cookie
> 
> Versions affected:
> Apache Guacamole 0.9.4 through 0.9.14
> 
> Description:
> Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage
> of the user's session token. This cookie lacked the "secure" flag,
> which could allow an attacker eavesdropping on the network to
> intercept the user's session token if unencrypted HTTP requests are
> made to the same domain.
> 
> Mitigation:
> Users of Apache Guacamole 0.9.14 or older should upgrade to 1.0.0.
> 
> Credit:
> We would like to thank Ross Golder for reporting this issue.

Would it be possible to confirm, is this 
https://issues.apache.org/jira/browse/GUACAMOLE-549
https://github.com/apache/guacamole-client/commit/884a9c0ee987f9cb49a69
?

Regards,
Salvatore

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.