LinkedIn AutoFill plugin bug left user data exposed

The flaw, now patched, could have allowed attackers to steal personal data undetected

code

An AutoFill plugin offered to LinkedIn members was affected by a bug that could have allowed an attacker to steal users' personal data.

The feature, which is offered to paying customers of LinkedIn's Marketing Solutions, allows a user to fill a website's form with their personal information, such as name, email address, phone number and place of work, at the click of a button.

If any of the websites compatible with the plugin contained a cross-site scripting (XSS) flaw that enabled an attacker to run malicious code, it would allow them to exploit the domain and steal any profile data the sites would retrieve from the user.

The flaw, which has now been patched according to LinkedIn, was flagged by teenage white hat hacker Jack Cable, who reported the vulnerability to LinkedIn and created a Proof of Concept demonstration to show how an attacker could run code to steal user data.

Although LinkedIn claims its AutoFill plugin was only compatible with domains it had whitelisted, Cable demonstrated that any website could have been a source of abuse until early April, when a patch was first applied.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The patch, put into action on 10 April, according to Cable, restricted AutoFill to whitelisted sites only. But the bug remained in the plugin until a second patch was applied on 19 April.

LinkedIn said in a statement: "We immediately prevented unauthorized use of this feature, once we were made aware of the issue. We are now pushing another fix that will address potential additional abuse cases and it will be in place shortly.

"While we've seen no signs of abuse, we're constantly working to ensure our members' data stays protected. We appreciate the researcher responsibly reporting this and our security team will continue to stay in touch with them.

"For clarity, LinkedIn AutoFill is not broadly available and only works on whitelisted domains for approved advertisers. It allows visitors to a website to choose to pre-populate a form with information from their LinkedIn profile."

Image credit: Bigstock

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019