You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/specification/draft/basic/security_best_practices.mdx
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,11 +142,11 @@ Token passthrough is explicitly forbidden in the [authorization specification](/
142
142
143
143
MCP servers **MUST NOT** accept any tokens that were not explicitly issued for the MCP server.
144
144
145
-
### 2.3 Session Hijacking
145
+
### Session Hijacking
146
146
147
147
Session hijacking is an attack vector where a client is provided a session ID by the server, and an unauthorized party is able to obtain and use that same session ID to impersonate the original client and perform unauthorized actions on their behalf.
148
148
149
-
#### 2.3.1 Session Hijack Prompt Injection
149
+
#### Session Hijack Prompt Injection
150
150
151
151
```mermaid
152
152
sequenceDiagram
@@ -172,7 +172,7 @@ sequenceDiagram
172
172
Client->>Client: Acts based on malicious payload
173
173
```
174
174
175
-
#### 2.3.2 Session Hijack Impersonation
175
+
#### Session Hijack Impersonation
176
176
177
177
```mermaid
178
178
sequenceDiagram
@@ -190,7 +190,7 @@ sequenceDiagram
190
190
Server-->>Attacker: Respond as if Attacker is Client (session hijack)
191
191
```
192
192
193
-
#### 2.3.3 Attack Description
193
+
#### Attack Description
194
194
195
195
When you have multiple stateful HTTP servers that handle MCP requests, the following attack vectors are possible:
196
196
@@ -214,7 +214,7 @@ When you have multiple stateful HTTP servers that handle MCP requests, the follo
214
214
3. The attacker makes calls to the MCP server using the session ID.
215
215
4. MCP server does not check for additional authorization and treats the attacker as a legitimate user, allowing unauthorized access or actions.
216
216
217
-
#### 2.3.4 Mitigation
217
+
#### Mitigation
218
218
219
219
To prevent session hijacking and event injection attacks, the following mitigations should be implemented:
0 commit comments