We found results for “”
CVE-2024-21643
Good to know:
Date: January 9, 2024
IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the "SignedHttpRequest"protocol or the "SignedHttpRequestValidator"is vulnerable. Microsoft.IdentityModel trusts the "jku"claim by default for the "SignedHttpRequest"protocol. This raises the possibility to make any remote or local "HTTP GET" request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.
Language: C#
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')
CWE-94Top Fix
Upgrade Version
Upgrade to version microsoft.identitymodel.protocols.signedhttprequest - 6.34.0;microsoft.identitymodel.protocols.signedhttprequest - 7.1.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


