SYM_JSTS_0131 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of Password Hash With Insufficient Computational Effort

Property Value
Language javascript
Severity medium
CWE CWE-916: Use of Password Hash With Insufficient Computational Effort
OWASP A02:2021 - Cryptographic Failures
Confidence Level Medium
Impact Level Low
Likelihood Level High

Description

The code uses Argon2 for password hashing but does not explicitly select the Argon2id variant, which is recommended for stronger protection against certain attacks. Using Argon2d or Argon2i instead can leave password hashes more vulnerable if an attacker gains access to the system.

Impact

If Argon2id is not used, attackers with access to the computing environment may exploit weaknesses in Argon2d or Argon2i, potentially making password cracking easier. This can lead to compromised user accounts and broader security breaches if passwords are stolen.