In Apache HTTP Server versions 2.4.0 to 2.4.23, modsessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.4.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.6"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.7"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.8"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.9"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.10"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.12"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.14"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.16"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.19"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.20"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.21"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.22"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.23"
}
]
}