In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
| Software | From | Fixed in |
|---|---|---|
| apache / http_server | 2.4.1 | 2.4.1.x |
| apache / http_server | 2.4.20 | 2.4.20.x |
| apache / http_server | 2.4.6 | 2.4.6.x |
| apache / http_server | 2.4.0 | 2.4.0.x |
| apache / http_server | 2.4.12 | 2.4.12.x |
| apache / http_server | 2.4.3 | 2.4.3.x |
| apache / http_server | 2.4.23 | 2.4.23.x |
| apache / http_server | 2.4.8 | 2.4.8.x |
| apache / http_server | 2.4.10 | 2.4.10.x |
| apache / http_server | 2.4.7 | 2.4.7.x |
| apache / http_server | 2.4.14 | 2.4.14.x |
| apache / http_server | 2.4.22 | 2.4.22.x |
| apache / http_server | 2.4.2 | 2.4.2.x |
| apache / http_server | 2.4.19 | 2.4.19.x |
| apache / http_server | 2.4.16 | 2.4.16.x |
| apache / http_server | 2.4.9 | 2.4.9.x |
| apache / http_server | 2.4.21 | 2.4.21.x |