icon

We found results for “

CVE-2024-21643

Good to know:

icon

Date: January 9, 2024

IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the "SignedHttpRequest"protocol or the "SignedHttpRequestValidator"is vulnerable. Microsoft.IdentityModel trusts the "jku"claim by default for the "SignedHttpRequest"protocol. This raises the possibility to make any remote or local "HTTP GET" request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.

Language: C#

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

Top Fix

icon

Upgrade Version

Upgrade to version microsoft.identitymodel.protocols.signedhttprequest - 6.34.0;microsoft.identitymodel.protocols.signedhttprequest - 7.1.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): LOW

Do you need more information?

Contact Us