Rapid7 Vulnerability & Exploit Database

Apache HTTPD: Padding Oracle in Apache mod_session_crypto (CVE-2016-0736)

Back to Search

Apache HTTPD: Padding Oracle in Apache mod_session_crypto (CVE-2016-0736)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
12/21/2016
Created
07/25/2018
Added
12/21/2016
Modified
01/08/2018

Description

The affected asset is vulnerable to this vulnerability ONLY if it is running one of the following modules: mod_session_crypto. Review your web server configuration for validation. Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks.

Solution(s)

  • apache-httpd-upgrade-2_4_25

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;