{"api_version":"1","generated_at":"2026-04-22T23:30:40+00:00","cve":"CVE-2018-1340","urls":{"html":"https://cve.report/CVE-2018-1340","api":"https://cve.report/api/cve/CVE-2018-1340.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1340","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1340"},"summary":{"title":"CVE-2018-1340","description":"Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the \"secure\" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2019-02-07 22:29:00","updated_at":"2023-11-07 02:55:00"},"problem_types":["CWE-311"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/106768","name":"106768","refsource":"BID","tags":["Third Party Advisory"],"title":"Malformed Request","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979@%3Cannounce.guacamole.apache.org%3E","name":"https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979@%3Cannounce.guacamole.apache.org%3E","refsource":"MISC","tags":["Mailing List","Vendor Advisory"],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E","name":"https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E","refsource":"","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1340","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1340","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1340","vulnerable":"1","versionEndIncluding":"0.9.14","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"guacamole","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","DATE_PUBLIC":"2019-01-23T00:00:00","ID":"CVE-2018-1340","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Guacamole","version":{"version_data":[{"version_value":"Apache Guacamole 0.9.4 to 0.9.14"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the \"secure\" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Sensitive Cookie in HTTPS Session Without 'Secure' Attribute"}]}]},"references":{"reference_data":[{"name":"https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979@%3Cannounce.guacamole.apache.org%3E","refsource":"MISC","url":"https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979@%3Cannounce.guacamole.apache.org%3E"},{"name":"106768","refsource":"BID","url":"http://www.securityfocus.com/bid/106768"}]}},"nvd":{"publishedDate":"2019-02-07 22:29:00","lastModifiedDate":"2023-11-07 02:55:00","problem_types":["CWE-311"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:guacamole:*:*:*:*:*:*:*:*","versionEndIncluding":"0.9.14","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1340","Ordinal":"116656","Title":"CVE-2018-1340","CVE":"CVE-2018-1340","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1340","Ordinal":"1","NoteData":"Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the \"secure\" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1340","Ordinal":"2","NoteData":"2019-02-07","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"1340","Ordinal":"3","NoteData":"2019-02-09","Type":"Other","Title":"Modified"}]}}}