Okta just squashed a particularly unusual bug in its software.
995 Archivesdigital security management company posted a bug fix report to its website (as spotted by The Verge) letting users know that a glitch in the system that theoretically allowed bad actors to gain access to accounts had been ironed out. Sounds normal enough, right? Well, here's the kicker: The bug could've allowed someone to log into an account without entering the passwordas long as the username was 52 characters or longer.
"During specific conditions, this could allow users to authenticate by only providing the username with the stored cache key of a previous successful authentication," Okta wrote.
It should be re-emphasized that this is no longer a concern for Okta users. The bug has been fixed. Unfortunately, it existed in the system for about three months, as Okta's report said the software had been affected since July until someone noticed on Oct. 30. That's a very long time for such a vulnerability to be present, but it's unclear at this point if anyone was negatively affected by it.
Topics Cybersecurity
(Editor: {typename type="name"/})
Woman slams random ‘social experiments,' says what we’re all thinking
Mattel honors everyday heroes fighting coronavirus with action figure line
Amazon tech workers called out sick to protest working conditions
NYT Strands hints, answers for April 23
New Apple iOS text bug can crash your iPhone with just a notification
Let's all learn from the 'GMA' reporter who went on air without pants
Uplifting illustrations promote hope during the coronavirus pandemic
Astronomers saw one galaxy impale another. The damage was an eye
Watch an alligator chase a dude in a kayak
Gmail search just got a lot smarter, thanks to AI
James Comey found out about his firing just like you did
接受PR>=1、BR>=1,流量相当,内容相关类链接。