LinkedIn AutoFill plugin bug left user data exposed

The flaw, now patched, could have allowed attackers to steal personal data undetected

code

An AutoFill plugin offered to LinkedIn members was affected by a bug that could have allowed an attacker to steal users' personal data.

The feature, which is offered to paying customers of LinkedIn's Marketing Solutions, allows a user to fill a website's form with their personal information, such as name, email address, phone number and place of work, at the click of a button.

If any of the websites compatible with the plugin contained a cross-site scripting (XSS) flaw that enabled an attacker to run malicious code, it would allow them to exploit the domain and steal any profile data the sites would retrieve from the user.

The flaw, which has now been patched according to LinkedIn, was flagged by teenage white hat hacker Jack Cable, who reported the vulnerability to LinkedIn and created a Proof of Concept demonstration to show how an attacker could run code to steal user data.

Although LinkedIn claims its AutoFill plugin was only compatible with domains it had whitelisted, Cable demonstrated that any website could have been a source of abuse until early April, when a patch was first applied.

The patch, put into action on 10 April, according to Cable, restricted AutoFill to whitelisted sites only. But the bug remained in the plugin until a second patch was applied on 19 April.

LinkedIn said in a statement: "We immediately prevented unauthorized use of this feature, once we were made aware of the issue. We are now pushing another fix that will address potential additional abuse cases and it will be in place shortly.

"While we've seen no signs of abuse, we're constantly working to ensure our members' data stays protected. We appreciate the researcher responsibly reporting this and our security team will continue to stay in touch with them.

"For clarity, LinkedIn AutoFill is not broadly available and only works on whitelisted domains for approved advertisers. It allows visitors to a website to choose to pre-populate a form with information from their LinkedIn profile."

Image credit: Bigstock

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Global ransom DDoS extortionists are retargeting companies
distributed denial of service (DDOS)

Global ransom DDoS extortionists are retargeting companies

22 Jan 2021
Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
BEC scammers are using Google Forms to identify easy victims
phishing

BEC scammers are using Google Forms to identify easy victims

21 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021