CVE-2024-21643

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21643
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21643.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21643
Aliases
Related
Published
2024-01-10T05:15:09Z
Modified
2025-05-28T10:38:01.439116Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the SignedHttpRequestprotocol or the SignedHttpRequestValidatoris vulnerable. Microsoft.IdentityModel trusts the jkuclaim by default for the SignedHttpRequestprotocol. This raises the possibility to make any remote or local HTTP GET request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.

References

Affected packages

Git / github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet

Affected ranges

Type
GIT
Repo
https://github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet
Events

Affected versions

5.*

5.4.0

6.*

6.10.1
6.11.0
6.11.1
6.12.0
6.12.1
6.12.2
6.13.0
6.13.1
6.14.1
6.15.1
6.16.0
6.17.0
6.18.0
6.19.0
6.20.0
6.21.0
6.22.0
6.22.1
6.23.0
6.23.1
6.24.0
6.25.0
6.25.1
6.26.0
6.27.0
6.28.0
6.28.1
6.29.0
6.30.0
6.30.1
6.31.0
6.32.1
6.32.2
6.32.3
6.5.0
6.5.1
6.6.0
6.7.0
6.7.1
6.9.0

7.*

7.0.0
7.0.1
7.0.2

v6.*

v6.32.0
v6.33.0
v6.5.0