Description
Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
Remediation
References
http://www.securityfocus.com/bid/106768
https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E
Related Vulnerabilities
CVE-2020-1948 Vulnerability in maven package org.apache.dubbo:dubbo-rpc-api
CVE-2018-12022 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2020-13942 Vulnerability in maven package org.apache.unomi:unomi-common
CVE-2018-3749 Vulnerability in maven package org.webjars.npm:deap
CVE-2021-37136 Vulnerability in maven package io.netty:netty-codec