LinkedIn AutoFill plugin bug left user data exposed

The flaw, now patched, could have allowed attackers to steal personal data undetected

code

An AutoFill plugin offered to LinkedIn members was affected by a bug that could have allowed an attacker to steal users' personal data.

The feature, which is offered to paying customers of LinkedIn's Marketing Solutions, allows a user to fill a website's form with their personal information, such as name, email address, phone number and place of work, at the click of a button.

If any of the websites compatible with the plugin contained a cross-site scripting (XSS) flaw that enabled an attacker to run malicious code, it would allow them to exploit the domain and steal any profile data the sites would retrieve from the user.

The flaw, which has now been patched according to LinkedIn, was flagged by teenage white hat hacker Jack Cable, who reported the vulnerability to LinkedIn and created a Proof of Concept demonstration to show how an attacker could run code to steal user data.

Although LinkedIn claims its AutoFill plugin was only compatible with domains it had whitelisted, Cable demonstrated that any website could have been a source of abuse until early April, when a patch was first applied.

The patch, put into action on 10 April, according to Cable, restricted AutoFill to whitelisted sites only. But the bug remained in the plugin until a second patch was applied on 19 April.

LinkedIn said in a statement: "We immediately prevented unauthorized use of this feature, once we were made aware of the issue. We are now pushing another fix that will address potential additional abuse cases and it will be in place shortly.

"While we've seen no signs of abuse, we're constantly working to ensure our members' data stays protected. We appreciate the researcher responsibly reporting this and our security team will continue to stay in touch with them.

"For clarity, LinkedIn AutoFill is not broadly available and only works on whitelisted domains for approved advertisers. It allows visitors to a website to choose to pre-populate a form with information from their LinkedIn profile."

Image credit: Bigstock

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021