Password idiocy at Jet Airways website
Whoever made changes to the code on the Jet Airways website should be in the least made to stand in a corner for the whole day. The line of code that’s responsible for a considerable bit of frustration for me on a Sunday is the following:
<input class=”formobject” id=”usrUserLogin_txtPassword” type=”password” maxlength=”8” name=”usrUserLogin:txtPassword”>
What it has done is to limit the password length to 8 characters, which, being longer than that in my case, is not letting me log in to the website to update my details. Basically, anyone with a password longer than eight characters won’t be able to log in to their account till someone fixes this. Ugh!
And what the magic of an industrial strength framework has done (Microsoft Commerce Server 2002, in this case) is to inherit the value of all the login boxes across the website from the same model, truncating it to eight characters before it is posted back for validation, which would fail for all passwords longer than eight characters.
I could find a loophole somewhere, with a mix of the Web Developer and Tamper Data extensions, to log in to my account. But the page that I wanted, to claim missing miles, checks back with the same model again, throwing me back to the log in page. I can only hope that this is an error on the logic front than someone having messed up the database itself.