Skip to content

Commit a0b7851

Browse files
committed
rework open redirect
1 parent 45e78e5 commit a0b7851

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -284,8 +284,7 @@ MCP clients **MUST** implement PKCE according to [OAuth 2.1 section 7.5.2](https
284284

285285

286286
### 3.3 Open Redirection
287-
An attacker may craft malicious redirect URIs to direct users to phishing sites
288-
and intercept credentials during the authorization flow.
287+
An attacker may craft malicious redirect URIs to direct users to phishing sites.
289288

290289
MCP clients **MUST** have redirect URIs registered with the authorization server.
291290

@@ -294,6 +293,9 @@ Authorization servers **MUST** validate exact redirect URIs against pre-register
294293
MCP clients **SHOULD** use and verify state parameters in the authorization code flow
295294
and discard any results that do not include or have a mis-match with the original state.
296295

296+
Authorization servers **MUST** take precautions to prevent redirecting user agents to untrusted URI's, following suggestions laid out in [RFC 9700 Section 4.11.2](https://www.rfc-editor.org/rfc/rfc9700.html#section-4.11.2)
297+
298+
Authorization servers **SHOULD** only automatically redirect the user agent if it trusts the redirection URI. If the URI is not trusted, the authorization server MAY inform the user and rely on the user to make the correct decision.
297299

298300
### 3.4 Confused Deputy Problem
299301

0 commit comments

Comments
 (0)