SYM_GO_0014 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of a Broken or Risky Cryptographic Algorithm

Property Value
Language go
Severity medium
CWE CWE-327: Use of a Broken or Risky Cryptographic Algorithm
OWASP A03:2017 - Sensitive Data Exposure
Confidence Level Medium
Impact Level Medium
Likelihood Level Medium

Description

MD5 is being used to hash passwords, but it is a weak and outdated algorithm that attackers can easily crack. Passwords should be hashed using secure algorithms like bcrypt.

Impact

If attackers breach your password database, they can quickly recover user passwords due to MD5's vulnerabilities. This can lead to account takeovers, data breaches, and loss of user trust in your application.