Skip to content

Commit 90bffc6

Browse files
authored
Update docs/specification/draft/basic/authorization.mdx
1 parent 02d2f1a commit 90bffc6

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,9 @@ Authorization servers **SHOULD** only automatically redirect the user agent if i
300300

301301
### 3.4 Access Token Privilege Restriction
302302

303-
An attacker can gain unauthorized access or perform token redirection attacks if an MCP server accepts tokens with incorrect audience claims. This vulnerability has two critical dimensions:
303+
An attacker can gain unauthorized access or otherwise compromise a MCP server if the server accepts tokens issued for other resources.
304+
305+
This vulnerability has two critical dimensions:
304306

305307
1. **Audience validation failures.** When an MCP server doesn't verify that tokens were specifically intended for it (for example, via the audience claim, as mentioned in [RFC9068](https://www.rfc-editor.org/rfc/rfc9068.html)), it may accept tokens originally issued for other services. This breaks the fundamental OAuth security boundary, allowing attackers to reuse legitimate tokens across different services than intended.
306308
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it introduces the "confused deputy" risk, outlined in [Section 3.4](#34-confused-deputy-problem). The MCP server becomes an unintentional proxy that can:

0 commit comments

Comments
 (0)