Okta just squashed a particularly unusual bug in its software.
The modernist eroticismsdigital security management company posted a bug fix report to its website (as spotted by The Verge) letting users know that a glitch in the system that theoretically allowed bad actors to gain access to accounts had been ironed out. Sounds normal enough, right? Well, here's the kicker: The bug could've allowed someone to log into an account without entering the passwordas long as the username was 52 characters or longer.
"During specific conditions, this could allow users to authenticate by only providing the username with the stored cache key of a previous successful authentication," Okta wrote.
It should be re-emphasized that this is no longer a concern for Okta users. The bug has been fixed. Unfortunately, it existed in the system for about three months, as Okta's report said the software had been affected since July until someone noticed on Oct. 30. That's a very long time for such a vulnerability to be present, but it's unclear at this point if anyone was negatively affected by it.
Topics Cybersecurity
(Editor: {typename type="name"/})
The 2 best free VPNs to try in 2025
I've got a gut feeling: Harnessing the power of intuition
'Call of Duty: WWII' won't ignore the Holocaust anymore
This video of Radiohead covering 'Gasolina' is the best kind of fake
OtterBox 15W MagSafe wireless charging stand: $14.95
State Department says it will consider reviewing content after Mar
These gloriously impractical VR goggles are the next Google Glass
Gotham City and Metropolis are coming to this massive theme park
USA vs. Haiti 2025 livestream: Watch Concacaf Gold Cup for free
Amazon Echo Look is first smart home device Kim Kardashian could love
NYT Connections Sports Edition hints and answers for June 22: Tips to solve Connections #272
ESPN is laying off a bunch of its on
接受PR>=1、BR>=1,流量相当,内容相关类链接。