You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am a security researcher, who is looking for security smells in Puppet scripts. I noticed instances of MD5 uses in one of the Puppet scripts. MD5 is vulnerable to attacks, and should be avoided. The Common Weakness Enumeration organization recommends against usage of weak cryptographic algorithms such as MD5. Reff: https://cwe.mitre.org/data/definitions/327.html.
I suggest the use of SHA512 , which is more secure. Any feedback is appreciated.
akondasif
changed the title
MD5 is vulnerable to security attacks and should be avoided
Use MD5 and binding to 0.0.0.0 can be security smells
Jul 14, 2018
akondasif
changed the title
Use MD5 and binding to 0.0.0.0 can be security smells
Three security smells: use MD5, binding to 0.0.0.0, and empty passwords
Jul 15, 2018
Along with the two security smells I also noticed instances of empty passwords. Empty passwords increase the guessability of passwords. The Common Weakness Organization (CWE) identifies use of empty passwords as a security weakness (https://cwe.mitre.org/data/definitions/258.html).
I suggest that to follow the strong password guidelines, and manage passwords with hiera.
Greetings,
I am a security researcher, who is looking for security smells in Puppet scripts. I noticed instances of MD5 uses in one of the Puppet scripts. MD5 is vulnerable to attacks, and should be avoided. The Common Weakness Enumeration organization recommends against usage of weak cryptographic algorithms such as MD5. Reff: https://cwe.mitre.org/data/definitions/327.html.
I suggest the use of SHA512 , which is more secure. Any feedback is appreciated.
Source: https://github.com/Vizir/carnival/blob/master/vagrant/modules/postgresql/manifests/role.pp
The text was updated successfully, but these errors were encountered: