In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 2.4.0 |
||
apache http server 2.4.1 |
||
apache http server 2.4.2 |
||
apache http server 2.4.3 |
||
apache http server 2.4.6 |
||
apache http server 2.4.7 |
||
apache http server 2.4.8 |
||
apache http server 2.4.9 |
||
apache http server 2.4.10 |
||
apache http server 2.4.12 |
||
apache http server 2.4.14 |
||
apache http server 2.4.16 |
||
apache http server 2.4.19 |
||
apache http server 2.4.20 |
||
apache http server 2.4.21 |
||
apache http server 2.4.22 |
||
apache http server 2.4.23 |