SYM_RB_0010 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of Weak Hash

Property Value
Language ruby
Severity medium
CWE CWE-328: Use of Weak Hash
OWASP A03:2017 - Sensitive Data Exposure
Confidence Level Medium
Impact Level Medium
Likelihood Level Low

Description

The code uses the SHA1 hashing algorithm, which is outdated and no longer secure due to proven vulnerabilities that allow attackers to create hash collisions. It's recommended to use stronger algorithms like SHA256 or SHA3 instead.

Impact

If SHA1 is used, attackers could exploit hash collisions to forge or tamper with data, potentially bypassing security checks or compromising sensitive information. This can lead to data breaches, authentication bypass, or other critical security failures in your application.