Scan to download
BTC $66,977.21 +0.24%
ETH $2,054.15 -0.51%
BNB $591.16 +0.83%
XRP $1.32 -0.01%
SOL $80.39 +0.99%
TRX $0.3158 +0.24%
DOGE $0.0913 +0.26%
ADA $0.2459 +0.70%
BCH $443.44 -0.20%
LINK $8.67 -0.62%
HYPE $35.76 +0.14%
AAVE $94.90 -0.37%
SUI $0.8736 +0.26%
XLM $0.1622 -2.05%
ZEC $237.68 +0.15%
BTC $66,977.21 +0.24%
ETH $2,054.15 -0.51%
BNB $591.16 +0.83%
XRP $1.32 -0.01%
SOL $80.39 +0.99%
TRX $0.3158 +0.24%
DOGE $0.0913 +0.26%
ADA $0.2459 +0.70%
BCH $443.44 -0.20%
LINK $8.67 -0.62%
HYPE $35.76 +0.14%
AAVE $94.90 -0.37%
SUI $0.8736 +0.26%
XLM $0.1622 -2.05%
ZEC $237.68 +0.15%

Okta: Fixed a critical security vulnerability that allowed usernames longer than 52 characters to bypass login verification

2024-11-02 21:19:18
Collection

ChainCatcher news, identity and access management software provider Okta officially stated that on October 30, 2024, an internal vulnerability was discovered in the AD/LDAP DelAuth when generating cached keys. The Bcrypt algorithm is used to generate cached keys, where we hash the combination string of userId + username + password. Under specific conditions, this can allow users to authenticate simply by providing a previously successfully authenticated stored cached key to the username.

The prerequisite for this vulnerability is that the username must be equal to or exceed 52 characters each time a cached key is generated for the user. The affected products and versions are Okta AD/LDAP DelAuth as of July 23, 2024, and this vulnerability has been resolved in Okta's production environment on October 30, 2024.

app_icon
ChainCatcher Building the Web3 world with innovations.