Skip to content

Commit c0e272a

Browse files
authored
Merge pull request modelcontextprotocol#760 from modelcontextprotocol/basil/remove_section_numbers
remove explicit section numbers from new content
2 parents 78283c8 + 91676cb commit c0e272a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

docs/specification/draft/basic/security_best_practices.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -142,11 +142,11 @@ Token passthrough is explicitly forbidden in the [authorization specification](/
142142

143143
MCP servers **MUST NOT** accept any tokens that were not explicitly issued for the MCP server.
144144

145-
### 2.3 Session Hijacking
145+
### Session Hijacking
146146

147147
Session hijacking is an attack vector where a client is provided a session ID by the server, and an unauthorized party is able to obtain and use that same session ID to impersonate the original client and perform unauthorized actions on their behalf.
148148

149-
#### 2.3.1 Session Hijack Prompt Injection
149+
#### Session Hijack Prompt Injection
150150

151151
```mermaid
152152
sequenceDiagram
@@ -172,7 +172,7 @@ sequenceDiagram
172172
Client->>Client: Acts based on malicious payload
173173
```
174174

175-
#### 2.3.2 Session Hijack Impersonation
175+
#### Session Hijack Impersonation
176176

177177
```mermaid
178178
sequenceDiagram
@@ -190,7 +190,7 @@ sequenceDiagram
190190
Server-->>Attacker: Respond as if Attacker is Client (session hijack)
191191
```
192192

193-
#### 2.3.3 Attack Description
193+
#### Attack Description
194194

195195
When you have multiple stateful HTTP servers that handle MCP requests, the following attack vectors are possible:
196196

@@ -214,7 +214,7 @@ When you have multiple stateful HTTP servers that handle MCP requests, the follo
214214
3. The attacker makes calls to the MCP server using the session ID.
215215
4. MCP server does not check for additional authorization and treats the attacker as a legitimate user, allowing unauthorized access or actions.
216216

217-
#### 2.3.4 Mitigation
217+
#### Mitigation
218218

219219
To prevent session hijacking and event injection attacks, the following mitigations should be implemented:
220220

0 commit comments

Comments
 (0)