Title: Fix for MD2, MD4 and MD5 Are Weak Hash Functions by softsectest · Pull Request #5 · softsectest/JavaVulnerableLab · GitHub
Open Graph Title: Fix for MD2, MD4 and MD5 Are Weak Hash Functions by softsectest · Pull Request #5 · softsectest/JavaVulnerableLab
X Title: Fix for MD2, MD4 and MD5 Are Weak Hash Functions by softsectest · Pull Request #5 · softsectest/JavaVulnerableLab
Description: Issue Link A weakness in the MD5 cryptographic hash function can result in a high number of different messages with the same MD5 hash (known as a "collision"). Previous work on MD5 collisions between 2004 and 2007 showed that the use of this hash function can lead to theoretical attack scenarios; however, more recent work has proven that this scenario can be exploited in practice. This exposes any system which relies on the MD5 hashing mechanism to a realistic threat of attack. It should be noted that the SHA-1 algorithm has also been found to exhibit a lack of collision resistance. MD2, MD4, MD5 are not recommended and a replacement such as SHA-2 (-224, -256, -384, -512) should be considered Here is a bad example using unsafe MD5: MessageDigest aBadDigest = MessageDigest.getInstance("MD5"); Which should be replaced with at least a SHA-2 algorithm: MessageDigest aBetterDigest = MessageDigest.getInstance("SHA-256");
Open Graph Description: Issue Link A weakness in the MD5 cryptographic hash function can result in a high number of different messages with the same MD5 hash (known as a "collision"). Previous work on MD5 colli...
X Description: Issue Link A weakness in the MD5 cryptographic hash function can result in a high number of different messages with the same MD5 hash (known as a "collision"). Previous work on M...
Opengraph URL: https://github.com/softsectest/JavaVulnerableLab/pull/5
X: @github
Domain: patch-diff.githubusercontent.com
| route-pattern | /:user_id/:repository/pull/:id/checks(.:format) |
| route-controller | pull_requests |
| route-action | checks |
| fetch-nonce | v2:29d6e727-9396-9fda-65fb-8d9b9a25b3c6 |
| current-catalog-service-hash | 87dc3bc62d9b466312751bfd5f889726f4f1337bdff4e8be7da7c93d6c00a25a |
| request-id | A25E:2FCD2A:9AA352:D56F0A:697C6984 |
| html-safe-nonce | a7b9d8aeac75422cbb2c0e6f19cfd465ddfac05c13f79083d8dfdac367b8d299 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBMjVFOjJGQ0QyQTo5QUEzNTI6RDU2RjBBOjY5N0M2OTg0IiwidmlzaXRvcl9pZCI6IjY1MDIzMjYxMDU1OTA3NTM2NjgiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ== |
| visitor-hmac | d90b26c033f4881f4f4c62074dbe8bc850f360bf5d30c1d7201ff188c2d6083c |
| hovercard-subject-tag | pull_request:485425866 |
| github-keyboard-shortcuts | repository,pull-request-list,pull-request-conversation,pull-request-files-changed,checks,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/softsectest/JavaVulnerableLab/pull/5/checks |
| twitter:image | https://avatars.githubusercontent.com/u/57906422?s=400&v=4 |
| twitter:card | summary_large_image |
| og:image | https://avatars.githubusercontent.com/u/57906422?s=400&v=4 |
| og:image:alt | Issue Link A weakness in the MD5 cryptographic hash function can result in a high number of different messages with the same MD5 hash (known as a "collision"). Previous work on MD5 colli... |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | da4f0ee56809799586f8ee546b27f94fe9b5893edfbf87732e82be45be013b52 |
| turbo-cache-control | no-preview |
| go-import | github.com/softsectest/JavaVulnerableLab git https://github.com/softsectest/JavaVulnerableLab.git |
| octolytics-dimension-user_id | 57906422 |
| octolytics-dimension-user_login | softsectest |
| octolytics-dimension-repository_id | 294215396 |
| octolytics-dimension-repository_nwo | softsectest/JavaVulnerableLab |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 28911199 |
| octolytics-dimension-repository_parent_nwo | CSPF-Founder/JavaVulnerableLab |
| octolytics-dimension-repository_network_root_id | 28911199 |
| octolytics-dimension-repository_network_root_nwo | CSPF-Founder/JavaVulnerableLab |
| turbo-body-classes | logged-out env-production page-responsive full-width full-width-p-0 |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 787d8d274e314f52ce6d846c7581f9476d8dc736 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width