In Apache HTTP Server versions 2.4.0 to 2.4.23, modsessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
{
"cpe": [
"cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.4.0"
},
{
"last_affected": "2.4.1"
},
{
"last_affected": "2.4.2"
},
{
"last_affected": "2.4.3"
},
{
"last_affected": "2.4.6"
},
{
"last_affected": "2.4.7"
},
{
"last_affected": "2.4.8"
},
{
"last_affected": "2.4.9"
},
{
"last_affected": "2.4.10"
},
{
"last_affected": "2.4.12"
},
{
"last_affected": "2.4.14"
},
{
"last_affected": "2.4.16"
},
{
"last_affected": "2.4.19"
},
{
"last_affected": "2.4.20"
},
{
"last_affected": "2.4.21"
},
{
"last_affected": "2.4.22"
},
{
"last_affected": "2.4.23"
}
]
}