Okta just squashed a particularly unusual bug in its software.
The House of Pleasures (House of Tolerance)digital security management company posted a bug fix report to its website (as spotted by The Verge) letting users know that a glitch in the system that theoretically allowed bad actors to gain access to accounts had been ironed out. Sounds normal enough, right? Well, here's the kicker: The bug could've allowed someone to log into an account without entering the passwordas long as the username was 52 characters or longer.
"During specific conditions, this could allow users to authenticate by only providing the username with the stored cache key of a previous successful authentication," Okta wrote.
It should be re-emphasized that this is no longer a concern for Okta users. The bug has been fixed. Unfortunately, it existed in the system for about three months, as Okta's report said the software had been affected since July until someone noticed on Oct. 30. That's a very long time for such a vulnerability to be present, but it's unclear at this point if anyone was negatively affected by it.
Topics Cybersecurity
(Editor: {typename type="name"/})
Skates in the deep sea may incubate eggs near 'black smoker' vents
Clever scientists catch up with rogue, ozone layer
Gwendoline Christie correctly predicted who would end up on the Iron Throne 2 whole years ago
Apple sends out media invitations for WWDC 2019 keynote
Old School PC Gaming: Classic Games that Have Aged Well
Two Teslas race, one above ground, one underground. Guess the winner.
WikiLeaks' Julian Assange charged under the Espionage Act
10 questions for King Bran after that 'Game of Thrones' finale
Trump administration to allow African elephant trophies back into U.S.
Mike Pence's neighbors are calling him out with rainbow flags
Trump's DEI keyword crusade hits the country's defense archives
Game of Thrones actor Jerome Flynn will advise a vegan crypto project
接受PR>=1、BR>=1,流量相当,内容相关类链接。