SYM_JAVA_0105 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of Weak Hash

Property Value
Language java
Severity high
CWE CWE-328: Use of Weak Hash
OWASP A03:2017 - Sensitive Data Exposure
Confidence Level High
Impact Level Medium
Likelihood Level Medium

Description

The code uses the SHA-1 hashing algorithm, which is outdated and no longer considered secure because it is vulnerable to collisions. Applications should use stronger algorithms like SHA-256, SHA-512, or a dedicated password hashing function such as PBKDF2.

Impact

If SHA-1 is used for hashing sensitive data or digital signatures, attackers could exploit its weaknesses to generate collisions, potentially allowing unauthorized access, data tampering, or impersonation. This can lead to data breaches, loss of data integrity, and undermine trust in the application's security.