GHSA-g636-q5fc-4pr7 – github.com/moov-io/customers
Package
Manager: go
Name: github.com/moov-io/customers
Vulnerable Version: >=0 <0.5.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
accounts: Hash account number using Salt @alovak found that currently when we build hash of account number we do not "salt" it. Which makes it vulnerable to rainbow table attack. **What did you expect to see?** I expected salt (some random number from configuration) to be used in [hash.AccountNumber](https://github.com/moov-io/customers/blob/master/pkg/secrets/hash/account_number.go#L13) I would generate salt per tenant at least (maybe per organization).
Metadata
Created: 2021-05-24T17:00:27Z
Modified: 2021-05-21T22:11:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-g636-q5fc-4pr7/GHSA-g636-q5fc-4pr7.json
CWE IDs: []
Alternative ID: N/A
Finding: F052
Auto approve: 1