In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master
branch but not yet published.
Affected versions of this package are vulnerable to Use of Weak Hash due to the use of MD5 for generating filenames from cache keys. An attacker can manipulate cache data or gain unauthorized access to sensitive information by crafting a key that results in the same MD5 hash as another valid key.
Note:
This is only exploitable if an attacker can predict or control the input to the MD5 hash function used for generating cache filenames.
This vulnerability can be mitigated by replacing MD5 with a more secure hash function like SHA-256, which has a significantly lower probability of collisions and is resistant to known attack vectors.