Okta’s Weird Vulnerability

Okta’s Weird Vulnerability

UFD Tech

6 месяцев назад

770,245 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@greenleaffisk7166
@greenleaffisk7166 - 11.11.2024 16:39

So tell my why my employer switched to Okta in June?

Ответить
@TheLancerMancer
@TheLancerMancer - 11.11.2024 18:28

"Finally fixed it" is a bit overcooked. Low/no known exploitation, most of the vulnerable accounts were likely service accounts and had to have been auth'd via Okta previously, and MFA completely defeats this attack. Embarrassing, but not terrible.

Ответить
@ShockFusionMedia
@ShockFusionMedia - 11.11.2024 20:42

Okta is garbage. Companies using it are not smart.

Ответить
@jmrm01
@jmrm01 - 11.11.2024 20:51

For people wondering about this bug: This was probably a very common class of bug called a buffer overrun. A large number of security flaws are caused by buffer overrun attacks.

The code probably set aside 50 or 51 characters to store the username ("the buffer"). If you typed a longer username, the extra characters were stored into the memory locations following the buffer. This causes whatever program variables that are stored at those memory locations to take on unexpected values. For example, it might set a flag saying the password has been verified.

The Android version named Marshmello had a very similar bug. When the phone asked for your PIN to unlock it, if you typed a few hundred characters (or over a thousand, I forget) the phone would unlock.

Yes, this type of bug could be fixed merely by checking that what the user typed fits within the buffer. But traditionally, programmers skipped such checks in the past because "nobody would ever type a string that long".

Ответить
@layter6888
@layter6888 - 11.11.2024 23:39

yea

Ответить
@tyw__
@tyw__ - 12.11.2024 01:26

Buffer overflow attack? 😂

Ответить
@bearb1asting
@bearb1asting - 12.11.2024 01:29

Very Linux

Ответить
@koushikraj9815
@koushikraj9815 - 12.11.2024 05:45

Funny thing was only okta knows that and others didn't figure it out. Et me ask how will take 52 character username in firstplace

Ответить
@andrewbedell9175
@andrewbedell9175 - 12.11.2024 06:34

I nearly crapped a brick when i saw it was okta, my employer uses it🤣

Ответить
@ritzee13
@ritzee13 - 12.11.2024 08:22

My university makes us use this every single time, and to think it was this vulnerable 😅

Ответить
@RipVanFish09
@RipVanFish09 - 12.11.2024 08:34

I’ve gotten used to seeing him without hair, it’s kinda weird when I get an older video in my feed lol.

Ответить
@Crits-Crafts
@Crits-Crafts - 12.11.2024 10:52

That explains why my work got rid of okta lol

Ответить
@steamyrobotlove
@steamyrobotlove - 12.11.2024 20:32

Especially since an email is a common username when logging in via Okta, easy to pass the 52 char len. :/

Ответить
@pothoc1
@pothoc1 - 12.11.2024 20:43

I wonder if it was a floating point error where the username took up the password section also

Ответить
@Necrotechian
@Necrotechian - 12.11.2024 21:08

in our company ordering app you can make a order if your email is over 25 characters... except it gets stuff in bit hell until someone from our sales team edits the email to be correct... also if you place the period " . " as a work number or instead of any other information it will also stop it from going through... a single space or completely empty field is fine but a period is too much... its a bit old program...

Ответить
@davidvernon3119
@davidvernon3119 - 12.11.2024 23:15

It’s also a great illustration as to why outsourcing security is becoming so popular. It’s someone else’s fault when something goes wrong

Ответить
@hiddenmistninja111
@hiddenmistninja111 - 13.11.2024 00:09

Making me laugh, my company uses okta. P good. Had no idea this was an issue

Ответить
@travwolfe101
@travwolfe101 - 13.11.2024 02:23

I've heard of weirder. Minecraft had a bug so powerful people could execute server owner level commands on multi-player servers for a while. Almost all servers had the same security company and in order to access it the admin had to open a box only they could access and open another box within that box. Normally anyone that opens the box would not see anything but one player figured out that by placing one chest in an anvil and naming it admin and then naming another server setup and placing the server setup chest within the admin chest once you clicked on it you could open the admin menu and execute code on the server and any linked computers. Yes full on remote code execution both in and out of Minecraft. Luckily the guys that found it only used it to troll in game. They managed to execute a code that made them admins so they could do anything they want and mess with that for a bit then got bored and executed a code that gave everyone on the server admin status on the server. They just watched the chaos happen after that.

Ответить
@person-iw8qj
@person-iw8qj - 13.11.2024 05:51

I APPLIED AT THIS COMPANY LOL

Ответить
@SFMExtraordinare
@SFMExtraordinare - 13.11.2024 08:09

“You got Active Directory?”
“Nah, we got that Disabled Understudy”

Ответить
@taylorhunt5459
@taylorhunt5459 - 13.11.2024 22:54

My theory is they used something like "bcrypt(username || password)" because bcrypt and others like it have a limit to them that could cause these to be overlooked or excluded.

Ответить
@Barrel_Of_Lube
@Barrel_Of_Lube - 14.11.2024 07:52

ngl bro i feel auth aint that difficult idk why people tweaking

Ответить
@peterhuh
@peterhuh - 14.11.2024 09:14

For Bitcoin wallets, it's the other way around. You just need a 12-word password, username is not needed.

Ответить
@jaybrooks1098
@jaybrooks1098 - 14.11.2024 21:23

that is absolutely crazy.. what the heck?

Ответить
@MultiDark2012
@MultiDark2012 - 15.11.2024 11:04

Scott Manleys son, 4 sure.

Ответить
@davitdavid7165
@davitdavid7165 - 15.11.2024 11:50

My university used that. They switched to Microsoft this semester

Ответить
@saulgallagher5668
@saulgallagher5668 - 16.11.2024 00:36

New Zealand Mentioned RAAAAAAAA WHAT THE FUCK IS A FAIR PRICE FOR FOOD

Ответить
@chipswithdinonuggies
@chipswithdinonuggies - 16.11.2024 09:39

Me when my college uses Okta login

Ответить
@AT78146
@AT78146 - 16.11.2024 10:07

Ayyeee, that looks like the place with the really long name in my country 👉😁👉

I'm making that guess because of the I'm pretty sure we only have M, N, K, W, H, N, P, R, A, E, I, O, U, but also because I don't know of many, if any other languages that use NG together like that.
(Yes we only use the G when it's connected to an N, makes the same sound as when you say "Gnat".
The language existed before The British put it on paper, don't judge me lol.)

Did I get it right? Is that New Zealand? 😃
Do I get a prize? 😂
Jk the prize was the Dad level jokes I made along the way 🌈

Ответить
@silvialuzmia
@silvialuzmia - 17.11.2024 03:22

Thia is kinda a big brain move if intentional, no one would expect it.. But it's a ticking time explosive

*YT now really heavily moderate the comment...

Ответить
@ImALazyDeveloper
@ImALazyDeveloper - 17.11.2024 19:59

Genuinely one of the stupidest things I’ve ever heard, whose idea was that????

Ответить
@GWAAAPSquad
@GWAAAPSquad - 18.11.2024 10:31

Fun fact, ADT Security uses OKTA for all of its employees and had a massive data breach at the same time. So much for a home security company 😂😂

Ответить
@alexandragrace8164
@alexandragrace8164 - 18.11.2024 18:21

lol I work for one of the top three universities in my company and we use Okta for all our emails, data servers, confidential research participants data etc
Ugh 😒

Ответить
@Mooooov0815
@Mooooov0815 - 18.11.2024 23:14

Anyone still counting Okta vulnerabilities at this point?

Ответить
@Monika-1382
@Monika-1382 - 19.11.2024 16:27

The fact that my uni uses okta-

Ответить
@Lemur57
@Lemur57 - 20.11.2024 21:11

The "they told us even though we're not sure it made a difference" is a sort of integrity to hope for

Ответить
@JazzyBoy02
@JazzyBoy02 - 20.11.2024 21:24

Good on Okta for telling everyone. Hopefully that means that if anyone was affected Okta did the right thing.

Ответить
@watercolourmark
@watercolourmark - 21.11.2024 01:08

Yeah, I've never worked there but I've been on their payroll for years.

Ответить
@Shundi879
@Shundi879 - 21.11.2024 02:46

You know that someone with a long name complained that they had to start entering their password all of a sudden.

Ответить
@Fluluru
@Fluluru - 21.11.2024 22:12

So that's why I couldn't finish my last POLS assignment

Ответить
@DynesLair-kb6qs
@DynesLair-kb6qs - 21.11.2024 23:03

This is why the majority of new features need to be off by default when first being implemented...

Ответить
@michall6376
@michall6376 - 22.11.2024 00:03

I thought every website in the world just uses the auth0 method, which I myself find more strange than what you described.

Ответить
@megamallow477
@megamallow477 - 22.11.2024 01:07

Glad to know that my company uses Okta.

Ответить
@TBK7913
@TBK7913 - 23.11.2024 21:17

My company uses okay 😂

Ответить
@WellWisdom.
@WellWisdom. - 26.11.2024 23:11

Freaking unreal.

Ответить
@Allthegoodhandlesaretakenlmao
@Allthegoodhandlesaretakenlmao - 30.11.2024 05:57

Critical vulnerability: Gives root access if asked in a stern voice

Ответить
@KennaDC
@KennaDC - 03.12.2024 06:53

The timing feels like they implemented something to deal with CrowdStrike and it backfired 😂

Ответить
@mkh.42
@mkh.42 - 04.12.2024 05:37

Well. Good thing i got hired on October 21st.

Ответить
@CAMSLAYER13
@CAMSLAYER13 - 05.12.2024 22:56

Full names with domain seems like a massice security risk anyway

Ответить
@RedDawn430
@RedDawn430 - 14.12.2024 00:45

My college got hacked because of it

Ответить