- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: ruby-security/no-md5-digest
Language: Ruby
Severity: Warning
Category: Security
CWE: 328
The rule “Avoid MD5 to generate hashes” is important because MD5 (Message Digest Algorithm 5) is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. However, it is considered to be a weak algorithm for generating hashes due to its vulnerabilities to collision attacks. A collision occurs when two different inputs produce the same hash output, which can lead to security risks such as data integrity issues or unauthorized access.
The significance of this rule is that it promotes the use of more secure hash functions. In cryptography, the strength of a hash function is determined by its resistance to collision attacks. More modern algorithms such as SHA-256 and SHA-3 are recommended as they provide better security than MD5.
To adhere to this rule, replace any use of MD5 in your code with a more secure hash function. For example, instead of Digest::MD5.hexdigest 'foo'
, you should use Digest::SHA256.hexdigest 'foo'
. Similarly, replace instances of OpenSSL::Digest::MD5.new
with OpenSSL::Digest::SHA256.new
. By doing so, you can ensure the integrity and security of your data.
require 'digest'
class Bad_md5
def bad_md5_code()
md5 = Digest::MD5.hexdigest 'foo'
md5 = Digest::MD5.new
md5 = Digest::MD5.base64digest 'foo'
md5 = Digest::MD5.digest 'foo'
digest = OpenSSL::Digest::MD5.new
digest = OpenSSL::Digest::MD5.hexdigest 'foo'
digest = OpenSSL::Digest::MD5.new
digest = OpenSSL::Digest::MD5.base64digest 'foo'
digest = OpenSSL::Digest::MD5.digest 'foo'
end
end
|
|
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products