Why does Microsoft.Identity.Web adds x-client-brkrver and other headers? #1460
-
I noticed that Microsoft.Identity.Web adds a number of additional parameters when redirecting to (in our case) AD B2C, like: x-client-brkrver = IDWeb.1.16.1.0 And (because of the user of MSAL.NET): In my opinion, this exposes details of the version of Microsoft.Identity.Web used by our application. In case of any vulnerability found in this version, this makes us more vulnerable than without this information being disclosed.
I am able to remove the x-client-brkrver parameter in the OnRedirectToIdentityProvider event. Is it a problem when we do so? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Let me try to shed some light on the headers sent by MSAL to the Identity Provider
@jennyf19 , @jmprieur - do you know if @marco987654 - when we detect a security issue in the SDK (which thankfully does not happen often), MSRC does attempt to contact all affected application owners. It uses the x-client-sku / x-client-ver to understand who is affected and then based on the client id Microsoft can contact the app owners. I haven't been involved in an SDK security incident in a long time, so things might have changed, but this is how things were some time ago. If you remove |
Beta Was this translation helpful? Give feedback.
Let me try to shed some light on the headers sent by MSAL to the Identity Provider