Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability
High severity
GitHub Reviewed
Published
Jan 9, 2024
in
AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet
•
Updated Feb 5, 2024
Package
Affected versions
< 6.34.0
>= 7.0.0-preview, < 7.1.2
Patched versions
6.34.0
7.1.2
Description
Published to the GitHub Advisory Database
Jan 9, 2024
Reviewed
Jan 9, 2024
Published by the National Vulnerability Database
Jan 10, 2024
Last updated
Feb 5, 2024
Impact
What kind of vulnerability is it? Who is impacted?
Anyone leveraging the
SignedHttpRequestprotocol or theSignedHttpRequestValidatoris vulnerable. Microsoft.IdentityModel trusts thejkuclaim by default for theSignedHttpRequestprotocol. This raises the possibility to make any remote or localHTTP GETrequest.Patches
Has the problem been patched? What versions should users upgrade to?
The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher, if using Microsoft.IdentityModel.Protocols.SignedHttpRequest.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, users must upgrade.
References
Are there any links users can visit to find out more?
https://aka.ms/IdentityModel/Jan2024/jku
References