Impact
What kind of vulnerability is it? Who is impacted?
Anyone leveraging the SignedHttpRequest
protocol or the SignedHttpRequestValidator
is vulnerable. Microsoft.IdentityModel trusts the jku
claim by default for the SignedHttpRequest
protocol. This raises the possibility to make any remote or local HTTP GET
request.
Patches
Has the problem been patched? What versions should users upgrade to?
The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher, if using Microsoft.IdentityModel.Protocols.SignedHttpRequest.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, users must upgrade.
References
Are there any links users can visit to find out more?
https://aka.ms/IdentityModel/Jan2024/jku
Impact
What kind of vulnerability is it? Who is impacted?
Anyone leveraging the
SignedHttpRequest
protocol or theSignedHttpRequestValidator
is vulnerable. Microsoft.IdentityModel trusts thejku
claim by default for theSignedHttpRequest
protocol. This raises the possibility to make any remote or localHTTP GET
request.Patches
Has the problem been patched? What versions should users upgrade to?
The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher, if using Microsoft.IdentityModel.Protocols.SignedHttpRequest.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, users must upgrade.
References
Are there any links users can visit to find out more?
https://aka.ms/IdentityModel/Jan2024/jku