Usage of Weak Hashing Library on a Password (SHA-1)
Overview
Rule ID:
java_lang_weak_password_hash_sha1
Applicable Languages: Java
Weakness ID: CWE-326
Description
Using a weak hashing algorithm like SHA-1 for passwords increases the risk of data breaches. SHA-1 is vulnerable to collision attacks, where distinct inputs can produce the same hash value, compromising data integrity and security.
Remediation Guidelines
Do not use SHA-1 for hashing passwords or sensitive data due to its vulnerabilities.
Instead, use stronger hashing algorithms such as SHA-256 to improve security.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated