IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by default for the `SignedHttpRequest`protocol. This raises the possibility to make any remote or local `HTTP GET` request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-01-10T04:13:16.959Z
Updated: 2024-08-01T22:27:35.811Z
Reserved: 2023-12-29T03:00:44.958Z
Link: CVE-2024-21643
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2024-01-10T05:15:09.050
Modified: 2024-01-19T22:53:31.730
Link: CVE-2024-21643
Redhat
No data.