CVE-2024-21643

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21643
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21643.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21643
Aliases
Published
2024-01-10T05:15:09Z
Modified
2024-05-30T04:14:11.166793Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the SignedHttpRequestprotocol or the SignedHttpRequestValidatoris vulnerable. Microsoft.IdentityModel trusts the jkuclaim by default for the SignedHttpRequestprotocol. This raises the possibility to make any remote or local HTTP GET request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.

References

Affected packages

Git / github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet

Affected ranges

Type
GIT
Repo
https://github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.4.0

6.*

6.10.1
6.11.0
6.11.1
6.12.0
6.12.1
6.12.2
6.13.0
6.13.1
6.14.1
6.15.1
6.16.0
6.17.0
6.18.0
6.19.0
6.20.0
6.21.0
6.22.0
6.22.1
6.23.0
6.23.1
6.24.0
6.25.0
6.25.1
6.26.0
6.27.0
6.28.0
6.28.1
6.29.0
6.30.0
6.30.1
6.31.0
6.32.1
6.32.2
6.32.3
6.5.0
6.5.1
6.6.0
6.7.0
6.7.1
6.9.0

v6.*

v6.32.0
v6.33.0
v6.5.0