Usage of custom Digest class

Overview

  • Rule ID: java_lang_information_leakage

  • Applicable Languages: Java

  • Weakness ID: CWE-327

Description

Creating your own Digest class is discouraged due to the high risk of errors in manually implementing cryptographic functions. It is safer and more secure to use standard Digest algorithms like SHA-256 or SHA-512.

Remediation Guidelines

  • Do not implement a custom Digest class manually, as it can introduce security vulnerabilities due to incorrect handling or flawed algorithms.

  • Instead, rely on established Digest algorithms such as SHA-256, SHA-384, SHA-512, or SHA-512/256. These standardized algorithms have been extensively tested and are widely trusted for their security.

References

Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL

Last updated