Home / Vulnerability Database / HTML5 : Weak hashing algorithm
HTML5
HTML5 : Weak hashing algorithm
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
HIPAA
Overview
The hash function used is not secure. Its use may lead to data confidentiality violation.
MD2, MD5, SHA1 hash functions have known vulnerabilities. Finding collisions for MD2, MD5 and SHA1 functions does not require significant resources.
Using weak hashing algorithms to verify the integrity of external files that are plugged in can lead to undetectable spoofing of their contents.
References
- CWE-326: Inadequate Encryption Strength
- CWE-328
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- OWASP Top 10 2021-A2-Cryptographic Failures
- OWASP Top 10 2021-A4-Insecure Design
- NIST Approved Algorithms
- Understanding Subresource Integrity
CRITICAL
DerScanner Severity Score
Do you want to fix HTML5 : Weak hashing algorithm in your application?
See also
HTML5
HTML5 : Missing required cryptographic step
HTML5
HTML5 : Cross-site request forgery (CSRF)
HTML5
