Vulnerability Is Not Fixed (Secure Password Storage: Part 3 Lesson)
Issue:
The password storage vulnerability is not fixed. Passwords are not being hashed by Argon2 correctly.
Test 1:
Ensure the Argon2 hashing function is being called correctly. See the Remediation step for specific code examples on how to call the function; ensure the arguments you are providing are the correct type. Verify that you are inserting the hash into the password column within the user table.
Test 2:
Register a new user and look at the User Registry tab. If you are calling the hashing function correctly, the password column should contain a hash that looks similar to this:
Ensure the different parts that make up the hash string are the expected values:
-
Variation should be
argon2id -
Memory cost should be
65536 -
Time cost should be
3
If any of these values do not match what you see in the password column, examine your register function for bugs.