Skip to content

Commit 330723a

Browse files
committed
fixup confused deputy
1 parent 14625f7 commit 330723a

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -288,4 +288,14 @@ and discard any results that do not include or have a mis-match with the origina
288288

289289

290290
### 3.5 Confused Deputy Problem
291-
An attacker can exploit OAuth proxy configurations that share 3rd party client credentials across multiple users. When an MCP server fronts another authorization server that does not support dynamic client registration, the MCP uses a static client_id with the backing service. If the backing service sets cookies after user authorization, an attacker can craft malicious authorization requests that bypass consent screens for previously authorized applications. MCP servers using a static client_id for a backing service MUST require explicit approval for each newly registered dynamic client prior to forwarding requests to the backing authorization server for user consent.
291+
292+
An attacker can exploit OAuth proxy configurations that share third-party client credentials
293+
across multiple users.
294+
295+
When an MCP server fronts an authorization server that does not support dynamic client
296+
registration, the MCP server will use a static client ID to acquire credentials for the
297+
upstream API.
298+
299+
If the the backing authorization server sets cookies after user consent, an attacker can craft malicious authorization requests that bypass consent flows for previously authorized applications.
300+
301+
MCP servers using a static client_id for a backing service MUST require explicit approval for each newly registered dynamic client prior to forwarding requests to the backing authorization server for user consent.

0 commit comments

Comments
 (0)