Description
Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
Remediation
References
http://www.securityfocus.com/bid/106768
https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E
Related Vulnerabilities
CVE-2020-28442 Vulnerability in maven package org.webjars.npm:js-data
CVE-2022-2063 Vulnerability in npm package nocodb
CVE-2020-10693 Vulnerability in maven package org.hibernate.validator:hibernate-validator
CVE-2017-16090 Vulnerability in npm package fsk-server
CVE-2021-39157 Vulnerability in npm package detect-character-encoding