Scan to download
BTC $77,339.03 -2.12%
ETH $2,307.55 -3.20%
BNB $626.95 -1.76%
XRP $1.40 -2.77%
SOL $84.75 -3.14%
TRX $0.3245 +0.28%
DOGE $0.0990 -0.53%
ADA $0.2479 -2.54%
BCH $450.62 -1.18%
LINK $9.32 -2.01%
HYPE $41.65 -2.48%
AAVE $97.25 -0.18%
SUI $0.9347 -2.11%
XLM $0.1656 -3.70%
ZEC $353.21 -1.54%
BTC $77,339.03 -2.12%
ETH $2,307.55 -3.20%
BNB $626.95 -1.76%
XRP $1.40 -2.77%
SOL $84.75 -3.14%
TRX $0.3245 +0.28%
DOGE $0.0990 -0.53%
ADA $0.2479 -2.54%
BCH $450.62 -1.18%
LINK $9.32 -2.01%
HYPE $41.65 -2.48%
AAVE $97.25 -0.18%
SUI $0.9347 -2.11%
XLM $0.1656 -3.70%
ZEC $353.21 -1.54%

Okta: Fixed a critical security vulnerability that allowed usernames longer than 52 characters to bypass login verification

2024-11-02 21:19:18
Collection

ChainCatcher news, identity and access management software provider Okta officially stated that on October 30, 2024, an internal vulnerability was discovered in the AD/LDAP DelAuth when generating cached keys. The Bcrypt algorithm is used to generate cached keys, where we hash the combination string of userId + username + password. Under specific conditions, this can allow users to authenticate simply by providing a previously successfully authenticated stored cached key to the username.

The prerequisite for this vulnerability is that the username must be equal to or exceed 52 characters each time a cached key is generated for the user. The affected products and versions are Okta AD/LDAP DelAuth as of July 23, 2024, and this vulnerability has been resolved in Okta's production environment on October 30, 2024.

app_icon
ChainCatcher Building the Web3 world with innovations.