Scan to download
BTC $79,125.89 -2.57%
ETH $2,228.94 -2.05%
BNB $666.79 -2.05%
XRP $1.44 -3.57%
SOL $89.18 -3.32%
TRX $0.3513 -0.42%
DOGE $0.1125 -2.82%
ADA $0.2616 -3.23%
BCH $426.91 -2.25%
LINK $10.08 -3.44%
HYPE $43.22 -6.73%
AAVE $92.23 -6.07%
SUI $1.09 -7.54%
XLM $0.1549 -4.31%
ZEC $508.37 -7.22%
BTC $79,125.89 -2.57%
ETH $2,228.94 -2.05%
BNB $666.79 -2.05%
XRP $1.44 -3.57%
SOL $89.18 -3.32%
TRX $0.3513 -0.42%
DOGE $0.1125 -2.82%
ADA $0.2616 -3.23%
BCH $426.91 -2.25%
LINK $10.08 -3.44%
HYPE $43.22 -6.73%
AAVE $92.23 -6.07%
SUI $1.09 -7.54%
XLM $0.1549 -4.31%
ZEC $508.37 -7.22%

Okta: Fixed a critical security vulnerability that allowed usernames longer than 52 characters to bypass login verification

2024-11-02 21:19:18
Collection

ChainCatcher news, identity and access management software provider Okta officially stated that on October 30, 2024, an internal vulnerability was discovered in the AD/LDAP DelAuth when generating cached keys. The Bcrypt algorithm is used to generate cached keys, where we hash the combination string of userId + username + password. Under specific conditions, this can allow users to authenticate simply by providing a previously successfully authenticated stored cached key to the username.

The prerequisite for this vulnerability is that the username must be equal to or exceed 52 characters each time a cached key is generated for the user. The affected products and versions are Okta AD/LDAP DelAuth as of July 23, 2024, and this vulnerability has been resolved in Okta's production environment on October 30, 2024.

app_icon
ChainCatcher Building the Web3 world with innovations.