SYM_PY_0248 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki
Use of a Broken or Risky Cryptographic Algorithm
Property | Value |
---|---|
Language | |
Severity | |
CWE | CWE-327: Use of a Broken or Risky Cryptographic Algorithm |
OWASP | A03:2017 - Sensitive Data Exposure |
Confidence Level | Medium |
Impact Level | Medium |
Likelihood Level | Low |
Description
The code uses the SHA1 hashing algorithm, which is no longer considered secure due to its vulnerability to collisions. Instead, use a stronger hash like SHA256 or SHA3 for cryptographic operations.
Impact
If SHA1 is used, attackers could exploit its weaknesses to create different inputs that produce the same hash, potentially forging digital signatures or compromising data integrity. This can lead to unauthorized data modification, fraud, or bypassing authentication mechanisms.