Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cryptographic API Misuse Vulnerability: Do not use Inadequate key length #1

Open
gxx777 opened this issue Jan 4, 2024 · 0 comments

Comments

@gxx777
Copy link

gxx777 commented Jan 4, 2024

Hello!
First and foremost, I would like to express my sincere gratitude for your contributions to this project.

Description:

I have identified a security vulnerability in the SupergirlOnCrypt v0.0.2 project by our cryptographic api misuse detection tool.The issue pertains to the use of a default RSA key length of 1024 bits, which is considered insecure due to advances in computing power and cryptographic weaknesses associated with shorter key lengths.

Affected Version

v0.0.2

References:

CWE-326: Inadequate Encryption Strength
NIST SP 800-131A r2

Location:

https://github.com/ThoughtfulDev/SupergirlOnCrypt/blob/master/App/RSA/RSAKeyGen.py#L7

Recommendations:

I recommend the following actions to mitigate the vulnerability:
Upgrade the RSA key length to a more secure option, such as 2048 bits.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant