You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
specification to indicate the locations of authorization servers. The Protected Resource Metadata document returned by the MCP server **MUST** include
@@ -92,7 +92,7 @@ MCP clients **MUST** be able to parse `WWW-Authenticate` headers and respond app
92
92
MCP clients **MUST** follow the OAuth 2.0 Authorization Server Metadata [RFC8414](https://datatracker.ietf.org/doc/html/rfc8414)
93
93
specification to obtain the information required to interact with the authorization server.
94
94
95
-
#### 2.3.4 Sequence Diagram
95
+
#### 2.3.3 Sequence Diagram
96
96
The following diagram outlines an example flow:
97
97
98
98
```mermaid
@@ -122,7 +122,7 @@ sequenceDiagram
122
122
Note over C,M: MCP communication continues with valid token
123
123
```
124
124
125
-
####2.4 MCP specific headers for discovery
125
+
### 2.4 MCP specific headers for discovery
126
126
127
127
MCP clients **SHOULD** include the `MCP-Protocol-Version: <protocol-version>` HTTP header during
128
128
any request to the MCP server allowing the MCP server to respond based on the MCP protocol version.
@@ -281,7 +281,7 @@ An attacker who has gained access to an authorization code contained in an autho
281
281
To mitigate this, MCP clients **MUST** implement PKCE according to [OAuth 2.1 Section 7.5.2](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.5.2).
282
282
PKCE helps prevent authorization code interception and injection attacks by requiring clients to create a secret verifier-challenge pair, ensuring that only the original requestor can exchange an authorization code for tokens.
283
283
284
-
### 3.3 Open Redirection
284
+
### 3.4 Open Redirection
285
285
286
286
An attacker may craft malicious redirect URIs to direct users to phishing sites.
287
287
@@ -296,7 +296,7 @@ Authorization servers **MUST** take precautions to prevent redirecting user agen
296
296
297
297
Authorization servers **SHOULD** only automatically redirect the user agent if it trusts the redirection URI. If the URI is not trusted, the authorization server MAY inform the user and rely on the user to make the correct decision.
298
298
299
-
### 3.4 Confused Deputy Problem
299
+
### 3.5 Confused Deputy Problem
300
300
301
301
Attackers can exploit MCP servers acting as intermediaries to third-party APIs, leading to confused deputy vulnerabilities.
302
302
By using stolen authorization codes, they can obtain access tokens without user consent.
0 commit comments