From 90db349f4bf623498d1b86bbf94495339824b90b Mon Sep 17 00:00:00 2001
From: Owen Mansel-Chan
+ This query alerts on any use of a weak cryptographic algorithm, that is
+ not a hashing algorithm. Use of broken or weak cryptographic hash
+ functions are handled by the
+ rb/weak-sensitive-data-hashing
query.
+
From 2a1c9d8ec15d6fe5fd169c33294498b2603eb67b Mon Sep 17 00:00:00 2001
From: Owen Mansel-Chan
- This query alerts on any use of a weak cryptographic algorithm, that is
+ This query alerts on any use of a weak cryptographic algorithm that is
not a hashing algorithm. Use of broken or weak cryptographic hash
functions are handled by the
py/weak-sensitive-data-hashing
query.
diff --git a/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp b/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
index d793312c45d6..3346d3f7015f 100644
--- a/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
+++ b/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
@@ -14,7 +14,7 @@
secure than it appears to be.
- This query alerts on any use of a weak cryptographic algorithm, that is
+ This query alerts on any use of a weak cryptographic algorithm that is
not a hashing algorithm. Use of broken or weak cryptographic hash
functions are handled by the
rb/weak-sensitive-data-hashing
query.
diff --git a/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp b/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
index e24222e09fc5..7bc1eb018e26 100644
--- a/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
+++ b/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
@@ -16,7 +16,7 @@
- This query alerts on any use of a weak cryptographic algorithm, that is
+ This query alerts on any use of a weak cryptographic algorithm that is
not a hashing algorithm. Use of broken or weak cryptographic hash
functions are handled by the
Using broken or weak cryptographic algorithms can leave data vulnerable to being decrypted. Many cryptographic algorithms provided by cryptography libraries are known to be weak, or
-flawed. Using such an algorithm means that an attacker may be able to easily decrypt the encrypted
-data. Using broken or weak cryptographic algorithms may compromise security guarantees such as confidentiality, integrity, and authenticity. Many cryptographic algorithms are known to be weak or flawed. The security guarantees of a system often rely on the underlying cryptography, so using a weak algorithm can have severe consequences. For example:
+ Using broken or weak cryptographic algorithms can leave data vulnerable to being decrypted. Many cryptographic algorithms provided by cryptography libraries are known to be weak, or
-flawed. Using such an algorithm means that an attacker may be able to easily decrypt the encrypted
-data. Using broken or weak cryptographic algorithms may compromise security guarantees such as confidentiality, integrity, and authenticity. Many cryptographic algorithms are known to be weak or flawed. The security guarantees of a system often rely on the underlying cryptography, so using a weak algorithm can have severe consequences. For example:
+
- Using broken or weak cryptographic algorithms can leave data
- vulnerable to being decrypted or forged by an attacker.
+ Using broken or weak cryptographic algorithms may compromise
+ security guarantees such as confidentiality, integrity, and
+ authenticity.
- Many cryptographic algorithms provided by cryptography
- libraries are known to be weak, or flawed. Using such an
- algorithm means that encrypted or hashed data is less
- secure than it appears to be.
+ Many cryptographic algorithms are known to be weak or flawed. The
+ security guarantees of a system often rely on the underlying
+ cryptography, so using a weak algorithm can have severe consequences.
+ For example:
- Using broken or weak cryptographic algorithms can leave data
- vulnerable to being decrypted or forged by an attacker.
+ Using broken or weak cryptographic algorithms may compromise
+ security guarantees such as confidentiality, integrity, and
+ authenticity.
- Many cryptographic algorithms provided by cryptography
- libraries are known to be weak, or flawed. Using such an
- algorithm means that encrypted or hashed data is less
- secure than it appears to be.
+ Many cryptographic algorithms are known to be weak or flawed. The
+ security guarantees of a system often rely on the underlying
+ cryptography, so using a weak algorithm can have severe consequences.
+ For example:
This query alerts on any use of a weak cryptographic algorithm that is
not a hashing algorithm. Use of broken or weak cryptographic hash
diff --git a/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp b/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
index 3346d3f7015f..3c4dae2ae7bc 100644
--- a/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
+++ b/ruby/ql/src/queries/security/cwe-327/BrokenCryptoAlgorithm.qhelp
@@ -4,15 +4,33 @@
- Using broken or weak cryptographic algorithms can leave data
- vulnerable to being decrypted or forged by an attacker.
+ Using broken or weak cryptographic algorithms may compromise
+ security guarantees such as confidentiality, integrity, and
+ authenticity.
- Many cryptographic algorithms provided by cryptography
- libraries are known to be weak, or flawed. Using such an
- algorithm means that encrypted or hashed data is less
- secure than it appears to be.
+ Many cryptographic algorithms are known to be weak or flawed. The
+ security guarantees of a system often rely on the underlying
+ cryptography, so using a weak algorithm can have severe consequences.
+ For example:
This query alerts on any use of a weak cryptographic algorithm that is
not a hashing algorithm. Use of broken or weak cryptographic hash
diff --git a/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp b/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
index 7bc1eb018e26..89aa8f71a58a 100644
--- a/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
+++ b/rust/ql/src/queries/security/CWE-327/BrokenCryptoAlgorithm.qhelp
@@ -3,17 +3,34 @@
"qhelp.dtd">
- Using broken or weak cryptographic algorithms can leave data
- vulnerable to being decrypted or forged by an attacker.
-
+ Using broken or weak cryptographic algorithms may compromise
+ security guarantees such as confidentiality, integrity, and
+ authenticity.
+
- Many cryptographic algorithms provided by cryptography
- libraries are known to be weak, or flawed. Using such an
- algorithm means that encrypted or hashed data is less
- secure than it appears to be.
-
+ Many cryptographic algorithms are known to be weak or flawed. The
+ security guarantees of a system often rely on the underlying
+ cryptography, so using a weak algorithm can have severe consequences.
+ For example:
+
This query alerts on any use of a weak cryptographic algorithm that is
From 2f22acdd062fd00ad3cbcf24a9008dbeeb547817 Mon Sep 17 00:00:00 2001
From: Owen Mansel-Chan rust/weak-sensitive-data-hashing
query.
From 0bcdb91639f5433b2a2f2b64c52b64f02b14b134 Mon Sep 17 00:00:00 2001
From: Owen Mansel-Chan
+
+
+
+
+
+
+
+