Authorization Bypass Affecting microsoft.identitymodel.protocols.signedhttprequest package, versions [6.5.0,6.34.0)[7.0.0-preview,7.1.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-MICROSOFTIDENTITYMODELPROTOCOLSSIGNEDHTTPREQUEST-6148657
  • published9 Jan 2024
  • disclosed9 Jan 2024
  • creditKarel Rymeš

Introduced: 9 Jan 2024

CVE-2024-21643  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade Microsoft.IdentityModel.Protocols.SignedHttpRequest to version 6.34.0, 7.1.2 or higher.

Overview

Microsoft.IdentityModel.Protocols.SignedHttpRequest is a package that includes types that provide support for the SignedHttpRequest protocol

Affected versions of this package are vulnerable to Authorization Bypass via the SignedHttpRequest protocol or the SignedHttpRequestValidator. The jku claim in the SignedHttpRequest protocol is trusted, allowing an attacker to make unauthorized remote or local HTTP GET requests.

CVSS Scores

version 3.1