🚀 Join our AI Wargame at Black Hat Asia and our Workshop + Wargame at NDC Sydney .


Weak Hashing Algorithm

MD5 and SHA1 are weak hashing algorithms and open to collision attacks. They are not suitable for cryptographic signature.

Remediation

  • At the time of writing, SHA3 is recommended. Best to use a slow hashing algorithm like bcrypt.
  • Ensure that the design allows one hashing algorithm to be replaced with another.

Metadata

  • Severity: low
  • Slug: weak-hashing-algorithm

CWEs

  • 916: Use of Password Hash With Insufficient Computational Effort
  • 327: Use of a Broken or Risky Cryptographic Algorithm
  • 328: Use of Weak Hash

OWASP

  • A02:2021: Cryptographic Failures

Available Labs

Select a language to explore available labs for this vulnerability.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more