Weak password hashing (MD5) detected.
- Rule ID: ruby_lang_weak_password_hash_md
- Languages: ruby
- Source: weak_password_hash_md.yml
Description
A weak hashing library can lead to data breaches and greater security risk.
Remediations
According to OWASP, MD5 and its predecessors are considered weak hash algorithms and therefore shouldn't be used.
✅ Use a recommended hashing library such as bcrypt or Argon2id for passwords
BCrypt::Password.create("password_123")
hasher = Argon2::Password.new()
hasher.create("password_123")
Resources
Associated CWE
- CWE-331: Insufficient Entropy
- CWE-328: Use of Weak Hash
- CWE-916: Use of Password Hash With Insufficient Computational Effort
OWASP Top 10
Configuration
To skip this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --skip-rule=ruby_lang_weak_password_hash_md
To run only this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --only-rule=ruby_lang_weak_password_hash_md
Ready to take the next step? Learn more about Bearer Cloud.