Skip to content

Commit 664f942

Browse files
committed
rm token validation, confused deputy, will add back later
1 parent a0b7851 commit 664f942

File tree

1 file changed

+0
-33
lines changed

1 file changed

+0
-33
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 0 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -297,36 +297,3 @@ Authorization servers **MUST** take precautions to prevent redirecting user agen
297297

298298
Authorization servers **SHOULD** only automatically redirect the user agent if it trusts the redirection URI. If the URI is not trusted, the authorization server MAY inform the user and rely on the user to make the correct decision.
299299

300-
### 3.4 Confused Deputy Problem
301-
302-
An attacker can exploit OAuth proxy configurations that share third-party client credentials
303-
across multiple users.
304-
305-
When an MCP server fronts an authorization server that does not support dynamic client
306-
registration, the MCP server will use a static client ID to acquire credentials for the
307-
upstream API.
308-
309-
If the the backing authorization server sets cookies after user consent, an attacker can craft malicious authorization requests that bypass consent flows for previously authorized applications.
310-
311-
MCP servers using a static client_id for a backing service MUST require explicit approval for each newly registered dynamic client prior to forwarding requests to the backing authorization server for user consent.
312-
313-
### 3.5 Token Validation
314-
315-
An attacker can gain unauthorized access or perform token redirection attacks if an MCP server accepts tokens with incorrect audience claims. This vulnerability has two critical dimensions:
316-
317-
1. **Audience validation failures.** When an MCP server doesn't verify that tokens were specifically intended for it (via the `aud` claim), it may accept tokens originally issued for other services. This breaks the fundamental OAuth security boundary, allowing attackers to reuse legitimate tokens across different services than intended.
318-
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it introduces the "confused deputy" risk, outlined in [Section 3.4](#34-confused-deputy-problem). The MCP server becomes an unintentional proxy that can:
319-
1. Enable privilege escalation across service boundaries
320-
1. Facilitate lateral movement through connected resources
321-
1. Allow circumvention of security controls between services
322-
1. Enable replay attacks against multiple backend systems
323-
324-
MCP servers **MUST** take all necessary steps to ensure no data is returned to unauthorized parties and **MUST** ensure any credentials are valid before processing the request.
325-
326-
For example, a MCP server could validate inbound tokens through one of the following approaches:
327-
328-
1. Token introspection, according to [RFC7662](https://datatracker.ietf.org/doc/html/rfc7662). 1. JWT validation, according to [RFC 9068](https://www.rfc-editor.org/rfc/rfc9068.html).
329-
1. Custom validation, according to the conventions established by the AS.
330-
331-
MCP servers **MUST** strictly validate token audiences and only accept tokens specifically intended for themselves. Implementers **MUST NOT** design architectures where clients send
332-
tokens through the MCP server intended for other resources.

0 commit comments

Comments
 (0)