Skip to content

Commit c9fccbb

Browse files
Fix versioned URLs
Follow-up to 98a1378. This changes two link URLs to match the version of the spec that they reside in.
1 parent 8d23e83 commit c9fccbb

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

docs/specification/2025-06-18/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ audiences **when the Authorization Server supports the capability**. To enable c
298298
- MCP clients **MUST** include the `resource` parameter in authorization and token requests as specified in the [Resource Parameter Implementation](#resource-parameter-implementation) section
299299
- MCP servers **MUST** validate that tokens presented to them were specifically issued for their use
300300

301-
The [Security Best Practices document](/specification/draft/basic/security_best_practices#token-passthrough)
301+
The [Security Best Practices document](/specification/2025-06-18/basic/security_best_practices#token-passthrough)
302302
outlines why token audience validation is crucial and why token passthrough is explicitly forbidden.
303303

304304
### Token Theft

docs/specification/draft/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ An attacker can gain unauthorized access or otherwise compromise a MCP server if
359359
This vulnerability has two critical dimensions:
360360

361361
1. **Audience validation failures.** When an MCP server doesn't verify that tokens were specifically intended for it (for example, via the audience claim, as mentioned in [RFC9068](https://www.rfc-editor.org/rfc/rfc9068.html)), it may accept tokens originally issued for other services. This breaks a fundamental OAuth security boundary, allowing attackers to reuse legitimate tokens across different services than intended.
362-
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the ["confused deputy" problem](#confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See the [Token Passthrough section](/specification/2025-06-18/basic/security_best_practices#token-passthrough) of the Security Best Practices guide for additional details.
362+
2. **Token passthrough.** If the MCP server not only accepts tokens with incorrect audiences but also forwards these unmodified tokens to downstream services, it can potentially cause the ["confused deputy" problem](#confused-deputy-problem), where the downstream API may incorrectly trust the token as if it came from the MCP server or assume the token was validated by the upstream API. See the [Token Passthrough section](/specification/draft/basic/security_best_practices#token-passthrough) of the Security Best Practices guide for additional details.
363363

364364
MCP servers **MUST** validate access tokens before processing the request, ensuring the access token is issued specifically for the MCP server, and take all necessary steps to ensure no data is returned to unauthorized parties.
365365

0 commit comments

Comments
 (0)