CVE-2024-21643

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21643
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21643.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21643
Aliases
Published
2024-01-10T04:13:16.959Z
Modified
2025-12-05T03:11:22.932203Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability
Details

IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the SignedHttpRequestprotocol or the SignedHttpRequestValidatoris vulnerable. Microsoft.IdentityModel trusts the jkuclaim by default for the SignedHttpRequestprotocol. This raises the possibility to make any remote or local HTTP GET request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/21xxx/CVE-2024-21643.json",
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

Git / github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet

Affected ranges

Type
GIT
Repo
https://github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "6.34.0"
        }
    ]
}
Type
GIT
Repo
https://github.com/azuread/azure-activedirectory-identitymodel-extensions-for-dotnet
Events
Database specific
{
    "versions": [
        {
            "introduced": "7.0.0-preview"
        },
        {
            "fixed": "7.1.2"
        }
    ]
}

Affected versions

5.*

5.4.0

6.*

6.10.1
6.11.0
6.11.1
6.12.0
6.12.1
6.12.2
6.13.0
6.13.1
6.14.1
6.15.1
6.16.0
6.17.0
6.18.0
6.19.0
6.20.0
6.21.0
6.22.0
6.22.1
6.23.0
6.23.1
6.24.0
6.25.0
6.25.1
6.26.0
6.27.0
6.28.0
6.28.1
6.29.0
6.30.0
6.30.1
6.31.0
6.32.1
6.32.2
6.32.3
6.5.0
6.5.1
6.6.0
6.7.0
6.7.1
6.9.0

v6.*

v6.32.0
v6.33.0
v6.5.0